This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate dragit

Dependencies

(32 total, 9 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 async-std^1.11.01.13.2up to date
 async_zip^0.0.90.0.18out of date
 bytesize^2.3.12.3.1up to date
 directories-next^2.0.02.0.0up to date
 futures^0.3.50.3.32up to date
 gdk^0.15.40.18.2out of date
 gio^0.15.40.22.2out of date
 glib^0.15.40.22.3out of date
 gtk^0.15.40.18.2out of date
 hex^0.4.20.4.3up to date
 hostname^0.4.20.4.2up to date
 libp2p ⚠️^0.44.00.56.0out of date
 log^0.4.80.4.29up to date
 env_logger^0.11.90.11.10up to date
 md-5^0.10.10.11.0out of date
 pnet^0.35.00.35.0up to date
 prost^0.14.30.14.3up to date
 serde^1.01.0.228up to date
 tempfile^3.2.03.27.0up to date
 tokio^1.29.11.50.0up to date
 tokio-util^0.7.30.7.18up to date
 toml^1.0.31.1.0+spec-1.1.0up to date
 smallvec^1.6.11.15.1up to date
 walkdir^2.3.22.5.0up to date
 zeroize_derive^1.1.11.4.3up to date
 rand_core^0.6.20.10.0out of date
 pnet_datalink^0.35.00.35.0up to date
 byteorder^1.4.31.5.0up to date
 zbus^5.14.05.14.0up to date
 zvariant^5.10.05.10.0up to date
 ipconfig^0.3.00.3.4up to date
 windows^0.32.00.62.2out of date

Build dependencies

(1 total, all up-to-date)

CrateRequiredLatestStatus
 prost-build^0.14.30.14.3up to date

Security Vulnerabilities

libp2p: libp2p Lack of resource management DoS

RUSTSEC-2022-0084

libp2p allows a potential attacker to cause victim p2p node to run out of memory

The out of memory failure can cause crashes where libp2p is intended to be used within large scale networks leading to potential Denial of Service (DoS) vector

Users should upgrade or reference the DoS mitigation strategies.