| Vulnerabilities | |||||
|---|---|---|---|---|---|
| Version | Suggest | Low | Medium | High | Critical |
| 5.3.0 | 0 | 0 | 0 | 0 | 0 |
| 5.2.0 | 0 | 0 | 0 | 0 | 0 |
| 5.1.0 | 0 | 0 | 0 | 0 | 0 |
| 5.0.0 | 0 | 0 | 0 | 0 | 0 |
| 4.6.0 | 0 | 0 | 0 | 0 | 0 |
| 4.5.0 | 0 | 0 | 0 | 0 | 0 |
| 4.4.0 | 0 | 0 | 0 | 0 | 0 |
| 4.3.0 | 0 | 0 | 0 | 0 | 0 |
| 4.2.2 | 0 | 0 | 0 | 0 | 0 |
| 4.2.1 | 0 | 0 | 0 | 0 | 0 |
| 4.2.0 | 0 | 0 | 0 | 0 | 0 |
| 4.1.1 | 0 | 0 | 0 | 0 | 0 |
| 4.1.0 | 0 | 0 | 0 | 0 | 0 |
| 4.0.0 | 0 | 0 | 0 | 0 | 0 |
| 3.9.2 | 0 | 0 | 0 | 0 | 0 |
| 3.9.1 | 0 | 0 | 0 | 0 | 0 |
| 3.9.0 | 0 | 0 | 0 | 0 | 0 |
| 3.8.0 | 0 | 0 | 0 | 0 | 0 |
| 3.7.0 | 0 | 0 | 0 | 0 | 0 |
| 3.6.0 | 0 | 0 | 0 | 0 | 0 |
| 3.5.0 | 0 | 0 | 0 | 0 | 0 |
| 3.4.0 | 0 | 0 | 0 | 0 | 0 |
| 3.3.0 | 0 | 0 | 0 | 0 | 0 |
| 3.2.0 | 0 | 0 | 0 | 0 | 0 |
| 3.1.0 | 0 | 0 | 0 | 0 | 0 |
| 3.0.0 | 0 | 0 | 0 | 0 | 0 |
| 2.10.1 | 0 | 0 | 0 | 0 | 0 |
| 2.10.0 | 0 | 0 | 0 | 0 | 0 |
| 2.9.0 | 0 | 0 | 0 | 0 | 0 |
| 2.8.0 | 0 | 0 | 0 | 0 | 0 |
| 2.7.0 | 0 | 0 | 0 | 0 | 0 |
| 2.6.0 | 0 | 0 | 0 | 0 | 0 |
| 2.5.1 | 0 | 0 | 0 | 0 | 0 |
| 2.5.0 | 0 | 0 | 0 | 0 | 0 |
| 2.4.0 | 0 | 0 | 0 | 0 | 0 |
| 2.3.0 | 0 | 0 | 0 | 0 | 0 |
| 2.2.0 | 0 | 0 | 0 | 0 | 0 |
| 2.1.1 | 0 | 0 | 0 | 0 | 0 |
| 2.1.0 | 0 | 0 | 0 | 0 | 0 |
| 2.0.1 | 0 | 0 | 0 | 0 | 0 |
| 2.0.0 | 0 | 0 | 1 | 0 | 0 |
| 1.1.1 | 0 | 0 | 0 | 0 | 0 |
| 1.1.0 | 0 | 0 | 1 | 0 | 0 |
| 1.0.2 | 0 | 0 | 1 | 0 | 0 |
| 1.0.1 | 0 | 0 | 1 | 0 | 0 |
| 1.0.0 | 0 | 0 | 1 | 0 | 0 |
| 0.5.2 | 0 | 0 | 1 | 0 | 0 |
| 0.5.1 | 0 | 0 | 1 | 0 | 0 |
| 0.5.0 | 0 | 0 | 1 | 0 | 0 |
| 0.4.0 | 0 | 0 | 1 | 0 | 0 |
| 0.3.0 | 0 | 0 | 1 | 0 | 0 |
| 0.2.3 | 0 | 0 | 1 | 0 | 0 |
| 0.2.2 | 0 | 0 | 1 | 0 | 0 |
| 0.2.1 | 0 | 0 | 0 | 0 | 0 |
| 0.2.0 | 0 | 0 | 0 | 0 | 0 |
| 0.1.0 | 0 | 0 | 0 | 0 | 0 |
| 0.0.2 | 0 | 0 | 0 | 0 | 0 |
| 0.0.1 | 0 | 0 | 0 | 0 | 0 |
5.3.0 - This version is safe to use because it has no known security vulnerabilities at this time. Find out if your coding project uses this component and get notified of any reported security vulnerabilities with Meterian-X Open Source Security Platform
Maintain your licence declarations and avoid unwanted licences to protect your IP the way you intended.
MIT - MIT LicenseProvides several wrapper types for Ord and Eq implementations on f64 and friends.
To use ordered_float without requiring the Rust standard library, disable
the default std feature:
[dependencies]
ordered-float = { version = "5.0", default-features = false }If you still want to have access to the Pow and Float traits, enable the libm feature.
The following optional features can be enabled in Cargo.toml:
libm: When not using the std feature, enable the libm feature of num-traits to still access the Pow and Float traits.arbitrary: Implements the arbitrary::Arbitrary trait.borsh: Adds implementations for traits provided by the borsh crate.bytemuck: Adds implementations for traits provided by the bytemuck crate.derive-visitor: Adds implementations for traits provided by the derive-visitor crate.num-cmp: Implements the num_cmp::NumCmp trait.proptest: Implements the proptest::Arbitrary trait.rand: Adds implementations for various distribution types provided by the rand crate.rkyv_16: Implements rkyv's Archive, Serialize and Deserialize traits with size_16.rkyv_32: Implements rkyv's Archive, Serialize and Deserialize traits with size_32.rkyv_64: Implements rkyv's Archive, Serialize and Deserialize traits with size_64.rkyv_ck: Implements the bytecheck::CheckBytes trait.schemars: Implements the schemars::JsonSchema trait.serde: Implements the serde::Serialize and serde::Deserialize traits.speedy: Implements speedy's Readable and Writable traits.MIT