This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate askama_shared

Dependencies

(15 total, 5 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 askama_escape^0.10.30.10.3up to date
 comrak^0.120.23.0out of date
 humansize^1.1.02.1.3out of date
 mime^0.30.3.17up to date
 mime_guess^22.0.4up to date
 nom^77.1.3up to date
 num-traits^0.2.60.2.18up to date
 percent-encoding^2.1.02.3.1up to date
 proc-macro2^11.0.81up to date
 quote^11.0.36up to date
 serde^1.01.0.200up to date
 serde_json^1.01.0.116up to date
 serde_yaml ⚠️^0.80.9.34+deprecatedout of date
 syn^12.0.60out of date
 toml^0.50.8.12out of date

Security Vulnerabilities

serde_yaml: Uncontrolled recursion leads to abort in deserialization

RUSTSEC-2018-0005

Affected versions of this crate did not properly check for recursion while deserializing aliases.

This allows an attacker to make a YAML file with an alias referring to itself causing an abort.

The flaw was corrected by checking the recursion depth.