Home
Packages
Vulnerabilities
Vendors
Report
Policy
Login
Signup
« List of all packages
core
Subscribe
Opam page:
https://opam.ocaml.org/packages/core/
Versions
Version
core.v0.17.2
(latest)
Subscribe
core.v0.17.1
Subscribe
core.v0.17.0
Subscribe
core.v0.16.2
Subscribe
core.v0.16.1
Subscribe
core.v0.16.0
Subscribe
core.v0.15.1
Subscribe
core.v0.15.0
Subscribe
core.v0.14.1
Subscribe
core.v0.14.0
Subscribe
core.v0.13.0
Subscribe
core.v0.12.4
Subscribe
core.v0.12.3
Subscribe
core.v0.12.2
Subscribe
Vulnerable external dependencies (74442)
Product
For package
Vendor
Severity
CVE
Published
linux-headers
core.v0.12.3
Linux
High
CVE-2023-4207 - Use-after-free in Linux kernel's net/sched: cls_fw component
9/6/2023
linux-headers
core.v0.12.2
Linux
High
CVE-2023-4207 - Use-after-free in Linux kernel's net/sched: cls_fw component
9/6/2023
linux-headers
core.v0.14.1
Linux
High
CVE-2023-4207 - Use-after-free in Linux kernel's net/sched: cls_fw component
9/6/2023
linux-headers
core.v0.13.0
Linux
High
CVE-2023-4207 - Use-after-free in Linux kernel's net/sched: cls_fw component
9/6/2023
linux-headers
core.v0.12.4
Linux
High
CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component
9/6/2023
linux-headers
core.v0.12.3
Linux
High
CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component
9/6/2023
linux-headers
core.v0.14.1
Linux
High
CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component
9/6/2023
linux-headers
core.v0.14.0
Linux
High
CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component
9/6/2023
linux-headers
core.v0.13.0
Linux
High
CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component
9/6/2023
linux-headers
core.v0.12.2
Linux
High
CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component
9/6/2023
linux-headers
core.v0.12.2
Red Hat
Medium
CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid
8/7/2023
linux-headers
core.v0.12.3
Red Hat
Medium
CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid
8/7/2023
linux-headers
core.v0.14.0
Red Hat
Medium
CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid
8/7/2023
linux-headers
core.v0.13.0
Red Hat
Medium
CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid
8/7/2023
linux-headers
core.v0.12.4
Red Hat
Medium
CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid
8/7/2023
linux-headers
core.v0.14.1
Red Hat
Medium
CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid
8/7/2023
linux-headers
core.v0.13.0
Red Hat
High
CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free
8/7/2023
linux-headers
core.v0.14.0
Red Hat
High
CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free
8/7/2023
linux-headers
core.v0.12.3
Red Hat
High
CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free
8/7/2023
linux-headers
core.v0.12.2
Red Hat
High
CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free
8/7/2023
Previous
1...
1941
1942
1943
1944
1945
1946
1947
1948
1949
1950
1951
...3723
Next