RUSTSEC-2017-0008 – serial
Package
Manager: cargo
Name: serial
Vulnerable Version: >=0.0.0-0
Severity
Level: Low
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: N/A pctlN/A
Details
`serial` crate is unmaintained The [`serial`](https://crates.io/crates/serial) crate is no longer maintained. Last release was on 2017-07-02. ## Possible alternatives Consider using an alternative, for instance the blocking librarys: - [serial2](https://crates.io/crates/serial2) - [serialport](https://crates.io/crates/serialport) or async alternatives: - [mio-serial](https://crates.io/crates/mio-serial) - [tokio-serial](https://crates.io/crates/tokio-serial)
Metadata
Created: 2017-07-02T12:00:00Z
Modified: 2024-12-04T13:14:28Z
Source: https://osv-vulnerabilities
CWE IDs: N/A
Alternative ID: N/A
Finding: F079
Auto approve: 1