This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate assets_manager

Dependencies

(14 total, 9 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 ahash^0.7.00.8.12out of date
 assets_manager_macros^0.10.2.5out of date
 crossbeam-channel^0.50.5.15up to date
 log^0.40.4.27up to date
 notify^4.08.1.0out of date
 parking_lot^0.110.12.4out of date
 serde^1.01.0.219up to date
 bincode^1.22.0.1out of date
 serde_cbor^0.110.11.2up to date
 serde_json^1.01.0.140up to date
 rmp-serde^0.151.3.0out of date
 ron^0.60.10.1out of date
 toml^0.50.9.0out of date
 serde_yaml ⚠️^0.80.9.34+deprecatedout of date

Dev dependencies

(3 total, 1 outdated)

CrateRequiredLatestStatus
 cfg-if^1.01.0.1up to date
 rand^0.80.9.1out of date
 serde^1.01.0.219up to date

Security Vulnerabilities

serde_yaml: Uncontrolled recursion leads to abort in deserialization

RUSTSEC-2018-0005

Affected versions of this crate did not properly check for recursion while deserializing aliases.

This allows an attacker to make a YAML file with an alias referring to itself causing an abort.

The flaw was corrected by checking the recursion depth.