This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate websocket-lite

Dependencies

(15 total, 10 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 base64^0.90.22.0out of date
 bytes^0.41.6.0out of date
 futures^0.10.3.30out of date
 httparse^11.8.0up to date
 native-tls^0.10.2.11out of date
 openssl ⚠️^0.100.10.64maybe insecure
 rand^0.50.8.5out of date
 sha1^0.60.10.6out of date
 tokio-codec^0.10.1.2up to date
 tokio-io^0.10.1.13up to date
 tokio-openssl^0.20.6.4out of date
 tokio-tcp^0.10.1.4up to date
 tokio-tls^0.10.3.1out of date
 url^12.5.0out of date
 websocket-codec^0.10.5.2out of date

Dev dependencies

(3 total, 1 outdated)

CrateRequiredLatestStatus
 structopt^0.20.3.26out of date
 tokio-core^0.10.1.18up to date
 tokio-timer^0.20.2.13up to date

Security Vulnerabilities

openssl: `openssl` `X509VerifyParamRef::set_host` buffer over-read

RUSTSEC-2023-0044

When this function was passed an empty string, openssl would attempt to call strlen on it, reading arbitrary memory until it reached a NUL byte.