This project contains known security vulnerabilities. Find detailed information at the bottom.

Crate wampire

Dependencies

(13 total, 6 outdated, 1 insecure)

CrateRequiredLatestStatus
 argparse^0.2.10.2.2up to date
 env_logger^0.50.11.3out of date
 eventual^0.1.70.1.7up to date
 itertools^0.70.12.1out of date
 log^0.40.4.21up to date
 rand^0.5.0-pre.10.8.5out of date
 rmp^0.80.8.14up to date
 rmp-serde^0.131.2.0out of date
 serde^1.01.0.198up to date
 serde_derive^1.01.0.198up to date
 serde_json^1.01.0.116up to date
 url^1.72.5.0out of date
 ws ⚠️^0.70.9.2insecure

Security Vulnerabilities

ws: Insufficient size checks in outgoing buffer in ws allows remote attacker to run the process out of memory

RUSTSEC-2020-0043

Affected versions of this crate did not properly check and cap the growth of the outgoing buffer.

This allows a remote attacker to take down the process by growing the buffer of their (single) connection until the process runs out of memory it can allocate and is killed.

The flaw was corrected in the parity-ws fork (>=0.10.0) by disconnecting a client when the buffer runs full.