This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate tokio-tungstenite

Dependencies

(8 total, 6 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 bytes^0.4.61.6.0out of date
 futures^0.1.170.3.30out of date
 native-tls^0.1.50.2.11out of date
 tokio-core^0.1.90.1.18up to date
 tokio-dns-unofficial^0.1.10.4.0out of date
 tokio-io^0.1.20.1.13up to date
 tokio-tls^0.1.40.3.1out of date
 tungstenite ⚠️^0.5.30.21.0out of date

Dev dependencies

(2 total, 1 outdated)

CrateRequiredLatestStatus
 tokio-core^0.1.120.1.18up to date
 url^1.6.02.5.0out of date

Security Vulnerabilities

tungstenite: Tungstenite allows remote attackers to cause a denial of service

RUSTSEC-2023-0065

The Tungstenite crate through 0.20.0 for Rust allows remote attackers to cause a denial of service (minutes of CPU consumption) via an excessive length of an HTTP header in a client handshake. The length affects both how many times a parse is attempted (e.g., thousands of times) and the average amount of data for each parse attempt (e.g., millions of bytes).