This project might be open to known security vulnerabilities , which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom .
Crate alacritty
Dependencies (18 total, 4 outdated, 1 possibly insecure)
Dev dependencies (1 total, 1 outdated)
Build dependencies (1 total, all up-to-date)
Crate Required Latest Status gl_generator ^0.14.0
0.14.0
up to date
Crate alacritty_terminal
Dependencies (13 total, 7 outdated, 1 possibly insecure)
Dev dependencies (1 total, all up-to-date)
Crate Required Latest Status serde_json ^1.0.0
1.0.94
up to date
Crate alacritty_config
Dependencies (3 total, 1 outdated)
Crate Required Latest Status log ^0.4.17
0.4.17
up to date serde_yaml ^0.8.24
0.9.19
out of date serde ^1.0.137
1.0.158
up to date
Crate alacritty_config_derive
Dependencies (3 total, 1 outdated)
Crate Required Latest Status syn ^1.0.53
2.0.10
out of date proc-macro2 ^1.0.24
1.0.53
up to date quote ^1.0.7
1.0.26
up to date
Dev dependencies (3 total, 1 outdated)
Crate Required Latest Status serde ^1.0.117
1.0.158
up to date serde_yaml ^0.8.14
0.9.19
out of date log ^0.4.11
0.4.17
up to date
Security Vulnerabilities serde_yaml
: Uncontrolled recursion leads to abort in deserializationRUSTSEC-2018-0005
Affected versions of this crate did not properly check for recursion
while deserializing aliases.
This allows an attacker to make a YAML file with an alias referring
to itself causing an abort.
The flaw was corrected by checking the recursion depth.