This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate makair-telemetry

Dependencies

(13 total, 5 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 base64^0.13.00.22.1out of date
 crc32fast^1.3.21.4.2up to date
 log^0.4.170.4.22up to date
 nom^7.1.17.1.3up to date
 thiserror^1.0.312.0.9out of date
 clap^3.1.184.5.23out of date
 env_logger^0.9.00.11.6out of date
 rand^0.8.50.8.5up to date
 serde^1.0.1371.0.216up to date
 serde_json^1.0.811.0.134up to date
 serial^0.4.00.4.0up to date
 tungstenite ⚠️^0.17.20.26.1out of date
 url^2.2.22.5.4up to date

Dev dependencies

(2 total, 1 outdated)

CrateRequiredLatestStatus
 ntest^0.8.10.9.3out of date
 proptest^1.0.01.6.0up to date

Security Vulnerabilities

tungstenite: Tungstenite allows remote attackers to cause a denial of service

RUSTSEC-2023-0065

The Tungstenite crate through 0.20.0 for Rust allows remote attackers to cause a denial of service (minutes of CPU consumption) via an excessive length of an HTTP header in a client handshake. The length affects both how many times a parse is attempted (e.g., thousands of times) and the average amount of data for each parse attempt (e.g., millions of bytes).