This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate serde_any

Dependencies

(8 total, 4 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 failure^0.1.10.1.8up to date
 ron^0.30.8.1out of date
 serde^11.0.198up to date
 serde-xml-any^0.0.30.0.3up to date
 serde_json^11.0.116up to date
 serde_urlencoded^0.5.20.7.1out of date
 serde_yaml ⚠️^0.70.9.34+deprecatedout of date
 toml^0.40.8.12out of date

Dev dependencies

(5 total, 3 outdated)

CrateRequiredLatestStatus
 matches^0.10.1.10up to date
 serde-value^0.50.7.0out of date
 serde_derive^11.0.198up to date
 structopt^0.20.3.26out of date
 version-sync^0.5.00.9.5out of date

Security Vulnerabilities

serde_yaml: Uncontrolled recursion leads to abort in deserialization

RUSTSEC-2018-0005

Affected versions of this crate did not properly check for recursion while deserializing aliases.

This allows an attacker to make a YAML file with an alias referring to itself causing an abort.

The flaw was corrected by checking the recursion depth.