logo

RUSTSEC-2017-0008 serial

Package

Manager: cargo
Name: serial
Vulnerable Version: >=0.0.0-0

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: N/A pctlN/A

Details

`serial` crate is unmaintained The [`serial`](https://crates.io/crates/serial) crate is no longer maintained. Last release was on 2017-07-02. ## Possible alternatives Consider using an alternative, for instance the blocking librarys: - [serial2](https://crates.io/crates/serial2) - [serialport](https://crates.io/crates/serialport) or async alternatives: - [mio-serial](https://crates.io/crates/mio-serial) - [tokio-serial](https://crates.io/crates/tokio-serial)

Metadata

Created: 2017-07-02T12:00:00Z
Modified: 2024-12-04T13:14:28Z
Source: https://osv-vulnerabilities
CWE IDs: N/A
Alternative ID: N/A
Finding: F079
Auto approve: 1