Home
Packages
Vulnerabilities
Vendors
Report
Policy
Login
Signup
« List of all packages
core
Subscribe
Opam page:
https://opam.ocaml.org/packages/core/
Versions
Version
core.v0.17.1
(latest)
Subscribe
core.v0.17.0
Subscribe
core.v0.16.2
Subscribe
core.v0.16.1
Subscribe
core.v0.16.0
Subscribe
core.v0.15.1
Subscribe
core.v0.15.0
Subscribe
core.v0.14.1
Subscribe
core.v0.14.0
Subscribe
core.v0.13.0
Subscribe
core.v0.12.4
Subscribe
core.v0.12.3
Subscribe
core.v0.12.2
Subscribe
Vulnerable external dependencies (69126)
Product
For package
Vendor
Severity
CVE
Published
linux-headers
core.v0.12.3
Linux
High
CVE-2023-4208 - Use-after-free in Linux kernel's net/sched: cls_u32 component
9/6/2023
linux-headers
core.v0.12.2
Linux
High
CVE-2023-4208 - Use-after-free in Linux kernel's net/sched: cls_u32 component
9/6/2023
linux-headers
core.v0.13.0
Linux
High
CVE-2023-4208 - Use-after-free in Linux kernel's net/sched: cls_u32 component
9/6/2023
linux-headers
core.v0.12.4
Linux
High
CVE-2023-4208 - Use-after-free in Linux kernel's net/sched: cls_u32 component
9/6/2023
linux-headers
core.v0.14.0
Linux
High
CVE-2023-4208 - Use-after-free in Linux kernel's net/sched: cls_u32 component
9/6/2023
linux-headers
core.v0.14.1
Linux
High
CVE-2023-4208 - Use-after-free in Linux kernel's net/sched: cls_u32 component
9/6/2023
linux-headers
core.v0.12.2
Linux
High
CVE-2023-4207 - Use-after-free in Linux kernel's net/sched: cls_fw component
9/6/2023
linux-headers
core.v0.12.4
Linux
High
CVE-2023-4207 - Use-after-free in Linux kernel's net/sched: cls_fw component
9/6/2023
linux-headers
core.v0.12.3
Linux
High
CVE-2023-4207 - Use-after-free in Linux kernel's net/sched: cls_fw component
9/6/2023
linux-headers
core.v0.13.0
Linux
High
CVE-2023-4207 - Use-after-free in Linux kernel's net/sched: cls_fw component
9/6/2023
linux-headers
core.v0.14.1
Linux
High
CVE-2023-4207 - Use-after-free in Linux kernel's net/sched: cls_fw component
9/6/2023
linux-headers
core.v0.14.0
Linux
High
CVE-2023-4207 - Use-after-free in Linux kernel's net/sched: cls_fw component
9/6/2023
linux-headers
core.v0.13.0
Linux
High
CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component
9/6/2023
linux-headers
core.v0.12.3
Linux
High
CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component
9/6/2023
linux-headers
core.v0.12.4
Linux
High
CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component
9/6/2023
linux-headers
core.v0.14.0
Linux
High
CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component
9/6/2023
linux-headers
core.v0.12.2
Linux
High
CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component
9/6/2023
linux-headers
core.v0.14.1
Linux
High
CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component
9/6/2023
linux-headers
core.v0.12.4
Red Hat
Medium
CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid
8/7/2023
linux-headers
core.v0.14.1
Red Hat
Medium
CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid
8/7/2023
Previous
1...
1727
1728
1729
1730
1731
1732
1733
1734
1735
1736
1737
...3457
Next