This image is from the Rust Security Advisory Database. Here are the key points about the vulnerability: Key Information: Advisory ID: RUSTSEC-2020-0128 Reported Date: November 24, 2020 Issued Date: January 30, 2021 (last modified on June 13, 2023) Package: Cache (crates.io) Vulnerability Type: Memory corruption, Thread safety Aliases: CVE-2020-36448, GHSA-g78p-g85h-q6ww References: GitHub issue CVSS Score: 8.1 (High) - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Versions: The crate unconditionally implements for . Description: - This allows users to insert that is not or not . - Such data race issues can lead to memory corruption. - Types or as in can result in memory corruption. - Types like or (non-Send or non-Sync) can result in memory corruption. - No patched versions available yet.