Home
Packages
Vulnerabilities
Vendors
Report
Policy
Login
Signup
« List of all packages
core
Subscribe
Opam page:
https://opam.ocaml.org/packages/core/
Versions
Version
core.v0.17.1
(latest)
Subscribe
core.v0.17.0
Subscribe
core.v0.16.2
Subscribe
core.v0.16.1
Subscribe
core.v0.16.0
Subscribe
core.v0.15.1
Subscribe
core.v0.15.0
Subscribe
core.v0.14.1
Subscribe
core.v0.14.0
Subscribe
core.v0.13.0
Subscribe
core.v0.12.4
Subscribe
core.v0.12.3
Subscribe
core.v0.12.2
Subscribe
Vulnerable external dependencies (69126)
Product
For package
Vendor
Severity
CVE
Published
linux-headers
core.v0.13.0
Red Hat
Low
CVE-2023-39194 - Kernel: xfrm: out-of-bounds read in __xfrm_state_filter_match()
10/9/2023
linux-headers
core.v0.12.2
Red Hat
Low
CVE-2023-39194 - Kernel: xfrm: out-of-bounds read in __xfrm_state_filter_match()
10/9/2023
linux-headers
core.v0.14.1
Red Hat
Medium
CVE-2023-39193 - Kernel: netfilter: xtables sctp out-of-bounds read in match_flags()
10/9/2023
linux-headers
core.v0.12.3
Red Hat
Medium
CVE-2023-39193 - Kernel: netfilter: xtables sctp out-of-bounds read in match_flags()
10/9/2023
linux-headers
core.v0.13.0
Red Hat
Medium
CVE-2023-39193 - Kernel: netfilter: xtables sctp out-of-bounds read in match_flags()
10/9/2023
linux-headers
core.v0.12.2
Red Hat
Medium
CVE-2023-39193 - Kernel: netfilter: xtables sctp out-of-bounds read in match_flags()
10/9/2023
linux-headers
core.v0.12.4
Red Hat
Medium
CVE-2023-39193 - Kernel: netfilter: xtables sctp out-of-bounds read in match_flags()
10/9/2023
linux-headers
core.v0.14.0
Red Hat
Medium
CVE-2023-39193 - Kernel: netfilter: xtables sctp out-of-bounds read in match_flags()
10/9/2023
linux-headers
core.v0.14.1
Red Hat
Medium
CVE-2023-39192 - Kernel: netfilter: xtables out-of-bounds read in u32_match_it()
10/9/2023
linux-headers
core.v0.12.2
Red Hat
Medium
CVE-2023-39192 - Kernel: netfilter: xtables out-of-bounds read in u32_match_it()
10/9/2023
linux-headers
core.v0.12.3
Red Hat
Medium
CVE-2023-39192 - Kernel: netfilter: xtables out-of-bounds read in u32_match_it()
10/9/2023
linux-headers
core.v0.14.0
Red Hat
Medium
CVE-2023-39192 - Kernel: netfilter: xtables out-of-bounds read in u32_match_it()
10/9/2023
linux-headers
core.v0.13.0
Red Hat
Medium
CVE-2023-39192 - Kernel: netfilter: xtables out-of-bounds read in u32_match_it()
10/9/2023
linux-headers
core.v0.12.4
Red Hat
Medium
CVE-2023-39192 - Kernel: netfilter: xtables out-of-bounds read in u32_match_it()
10/9/2023
linux-headers
core.v0.13.0
Red Hat
High
CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr
10/4/2023
linux-headers
core.v0.14.1
Red Hat
High
CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr
10/4/2023
linux-headers
core.v0.14.0
Red Hat
High
CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr
10/4/2023
linux-headers
core.v0.12.4
Red Hat
High
CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr
10/4/2023
linux-headers
core.v0.12.3
Red Hat
High
CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr
10/4/2023
linux-headers
core.v0.12.2
Red Hat
High
CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr
10/4/2023
Previous
1...
1732
1733
1734
1735
1736
1737
1738
1739
1740
1741
1742
...3457
Next