One of them requires the user to click run on a file, much like running an EXE. The other, simply saves potentially malicious data to external storage which would then have to be run by a separate malicious third-party app. This are far from RCE exploits that execute immediately without poor user decision making, and Rust is not impervious to security exploits similar to these.
Or maybe let's use some research language made by Wirth, and get access to all 10 of packages and 5 devs worldwide using it :-)