Home
Packages
Vulnerabilities
Vendors
Report
Policy
Login
Signup
« List of all packages
core
Subscribe
Opam page:
https://opam.ocaml.org/packages/core/
Versions
Version
core.v0.17.1
(latest)
Subscribe
core.v0.17.0
Subscribe
core.v0.16.2
Subscribe
core.v0.16.1
Subscribe
core.v0.16.0
Subscribe
core.v0.15.1
Subscribe
core.v0.15.0
Subscribe
core.v0.14.1
Subscribe
core.v0.14.0
Subscribe
core.v0.13.0
Subscribe
core.v0.12.4
Subscribe
core.v0.12.3
Subscribe
core.v0.12.2
Subscribe
Vulnerable external dependencies (69126)
Product
For package
Vendor
Severity
CVE
Published
linux-headers
core.v0.14.1
Linux
Unknown
CVE-2023-52661 - drm/tegra: rgb: Fix missing clk_put() in the error handling paths of tegra_dc_rgb_probe()
5/17/2024
linux-headers
core.v0.12.2
Linux
Unknown
CVE-2023-52661 - drm/tegra: rgb: Fix missing clk_put() in the error handling paths of tegra_dc_rgb_probe()
5/17/2024
linux-headers
core.v0.12.3
Linux
Unknown
CVE-2023-52661 - drm/tegra: rgb: Fix missing clk_put() in the error handling paths of tegra_dc_rgb_probe()
5/17/2024
linux-headers
core.v0.12.4
Linux
Unknown
CVE-2023-52661 - drm/tegra: rgb: Fix missing clk_put() in the error handling paths of tegra_dc_rgb_probe()
5/17/2024
linux-headers
core.v0.12.3
Linux
Unknown
CVE-2023-52660 - media: rkisp1: Fix IRQ handling due to shared interrupts
5/17/2024
linux-headers
core.v0.12.2
Linux
Unknown
CVE-2023-52660 - media: rkisp1: Fix IRQ handling due to shared interrupts
5/17/2024
linux-headers
core.v0.14.0
Linux
Unknown
CVE-2023-52660 - media: rkisp1: Fix IRQ handling due to shared interrupts
5/17/2024
linux-headers
core.v0.14.1
Linux
Unknown
CVE-2023-52660 - media: rkisp1: Fix IRQ handling due to shared interrupts
5/17/2024
linux-headers
core.v0.12.4
Linux
Unknown
CVE-2023-52660 - media: rkisp1: Fix IRQ handling due to shared interrupts
5/17/2024
linux-headers
core.v0.13.0
Linux
Unknown
CVE-2023-52660 - media: rkisp1: Fix IRQ handling due to shared interrupts
5/17/2024
linux-headers
core.v0.14.1
Linux
Unknown
CVE-2023-52659 - x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type
5/17/2024
linux-headers
core.v0.12.3
Linux
Unknown
CVE-2023-52659 - x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type
5/17/2024
linux-headers
core.v0.12.2
Linux
Unknown
CVE-2023-52659 - x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type
5/17/2024
linux-headers
core.v0.12.4
Linux
Unknown
CVE-2023-52659 - x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type
5/17/2024
linux-headers
core.v0.13.0
Linux
Unknown
CVE-2023-52659 - x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type
5/17/2024
linux-headers
core.v0.14.0
Linux
Unknown
CVE-2023-52659 - x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type
5/17/2024
linux-headers
core.v0.14.0
Linux
Unknown
CVE-2023-52658 - Revert "net/mlx5: Block entering switchdev mode with ns inconsistency"
5/17/2024
linux-headers
core.v0.13.0
Linux
Unknown
CVE-2023-52658 - Revert "net/mlx5: Block entering switchdev mode with ns inconsistency"
5/17/2024
linux-headers
core.v0.14.1
Linux
Unknown
CVE-2023-52658 - Revert "net/mlx5: Block entering switchdev mode with ns inconsistency"
5/17/2024
linux-headers
core.v0.12.2
Linux
Unknown
CVE-2023-52658 - Revert "net/mlx5: Block entering switchdev mode with ns inconsistency"
5/17/2024
Previous
1...
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
...3457
Next