This project might be open to known security vulnerabilities , which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom .
Crate alacritty
Dependencies (18 total, 2 outdated, 1 possibly insecure)
Dev dependencies (1 total, 1 outdated)
Build dependencies (1 total, all up-to-date)
Crate Required Latest Status gl_generator ^0.14.0
0.14.0
up to date
Crate alacritty_terminal
Dependencies (13 total, 5 outdated, 1 possibly insecure)
Dev dependencies (1 total, all up-to-date)
Crate Required Latest Status serde_json ^1.0.0
1.0.91
up to date
Crate alacritty_config
Dependencies (3 total, 1 outdated)
Crate Required Latest Status log ^0.4.17
0.4.17
up to date serde_yaml ^0.8.24
0.9.17
out of date serde ^1.0.137
1.0.152
up to date
Crate alacritty_config_derive
Dependencies (3 total, all up-to-date)
Crate Required Latest Status syn ^1.0.53
1.0.107
up to date proc-macro2 ^1.0.24
1.0.50
up to date quote ^1.0.7
1.0.23
up to date
Dev dependencies (3 total, 1 outdated)
Crate Required Latest Status serde ^1.0.117
1.0.152
up to date serde_yaml ^0.8.14
0.9.17
out of date log ^0.4.11
0.4.17
up to date
Security Vulnerabilities serde_yaml
: Uncontrolled recursion leads to abort in deserializationRUSTSEC-2018-0005
Affected versions of this crate did not properly check for recursion
while deserializing aliases.
This allows an attacker to make a YAML file with an alias referring
to itself causing an abort.
The flaw was corrected by checking the recursion depth.