This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate assets_manager

Dependencies

(14 total, 8 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 ahash^0.7.00.8.11out of date
 assets_manager_macros^0.10.2.4out of date
 crossbeam-channel^0.50.5.12up to date
 log^0.40.4.21up to date
 notify^4.06.1.1out of date
 parking_lot^0.110.12.1out of date
 serde^1.01.0.198up to date
 bincode^1.21.3.3up to date
 serde_cbor^0.110.11.2up to date
 serde_json^1.01.0.116up to date
 rmp-serde^0.151.2.0out of date
 ron^0.60.8.1out of date
 toml^0.50.8.12out of date
 serde_yaml ⚠️^0.80.9.34+deprecatedout of date

Dev dependencies

(3 total, all up-to-date)

CrateRequiredLatestStatus
 cfg-if^1.01.0.0up to date
 rand^0.80.8.5up to date
 serde^1.01.0.198up to date

Security Vulnerabilities

serde_yaml: Uncontrolled recursion leads to abort in deserialization

RUSTSEC-2018-0005

Affected versions of this crate did not properly check for recursion while deserializing aliases.

This allows an attacker to make a YAML file with an alias referring to itself causing an abort.

The flaw was corrected by checking the recursion depth.