This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate makair-telemetry

Dependencies

(13 total, 7 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 base64^0.13.00.22.1out of date
 crc32fast^1.3.21.4.2up to date
 log^0.4.170.4.27up to date
 nom^7.1.18.0.0out of date
 thiserror^1.0.312.0.12out of date
 clap^3.1.184.5.35out of date
 env_logger^0.9.00.11.8out of date
 rand^0.8.50.9.0out of date
 serde^1.0.1371.0.219up to date
 serde_json^1.0.811.0.140up to date
 serial^0.4.00.4.0up to date
 tungstenite ⚠️^0.17.20.26.2out of date
 url^2.2.22.5.4up to date

Dev dependencies

(2 total, 1 outdated)

CrateRequiredLatestStatus
 ntest^0.8.10.9.3out of date
 proptest^1.0.01.6.0up to date

Security Vulnerabilities

tungstenite: Tungstenite allows remote attackers to cause a denial of service

RUSTSEC-2023-0065

The Tungstenite crate through 0.20.0 for Rust allows remote attackers to cause a denial of service (minutes of CPU consumption) via an excessive length of an HTTP header in a client handshake. The length affects both how many times a parse is attempted (e.g., thousands of times) and the average amount of data for each parse attempt (e.g., millions of bytes).