Home
Packages
Vulnerabilities
Vendors
Report
Policy
Login
Signup
« List of all packages
core
Subscribe
Opam page:
https://opam.ocaml.org/packages/core/
Versions
Version
core.v0.17.2
(latest)
Subscribe
core.v0.17.1
Subscribe
core.v0.17.0
Subscribe
core.v0.16.2
Subscribe
core.v0.16.1
Subscribe
core.v0.16.0
Subscribe
core.v0.15.1
Subscribe
core.v0.15.0
Subscribe
core.v0.14.1
Subscribe
core.v0.14.0
Subscribe
core.v0.13.0
Subscribe
core.v0.12.4
Subscribe
core.v0.12.3
Subscribe
core.v0.12.2
Subscribe
Vulnerable external dependencies (74442)
Product
For package
Vendor
Severity
CVE
Published
linux-headers
core.v0.13.0
Red Hat
Medium
CVE-2023-39192 - Kernel: netfilter: xtables out-of-bounds read in u32_match_it()
10/9/2023
linux-headers
core.v0.12.3
Red Hat
Medium
CVE-2023-39192 - Kernel: netfilter: xtables out-of-bounds read in u32_match_it()
10/9/2023
linux-headers
core.v0.12.4
Red Hat
Medium
CVE-2023-39192 - Kernel: netfilter: xtables out-of-bounds read in u32_match_it()
10/9/2023
linux-headers
core.v0.14.0
Red Hat
Medium
CVE-2023-39192 - Kernel: netfilter: xtables out-of-bounds read in u32_match_it()
10/9/2023
linux-headers
core.v0.14.1
Red Hat
Medium
CVE-2023-39192 - Kernel: netfilter: xtables out-of-bounds read in u32_match_it()
10/9/2023
linux-headers
core.v0.12.2
Red Hat
Medium
CVE-2023-39192 - Kernel: netfilter: xtables out-of-bounds read in u32_match_it()
10/9/2023
linux-headers
core.v0.12.3
Red Hat
High
CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr
10/4/2023
linux-headers
core.v0.12.2
Red Hat
High
CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr
10/4/2023
linux-headers
core.v0.13.0
Red Hat
High
CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr
10/4/2023
linux-headers
core.v0.12.4
Red Hat
High
CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr
10/4/2023
linux-headers
core.v0.14.0
Red Hat
High
CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr
10/4/2023
linux-headers
core.v0.14.1
Red Hat
High
CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr
10/4/2023
linux-headers
core.v0.14.1
Red Hat
Medium
CVE-2023-39189 - Kernel: netfilter: nftables out-of-bounds read in nf_osf_match_one()
10/9/2023
linux-headers
core.v0.13.0
Red Hat
Medium
CVE-2023-39189 - Kernel: netfilter: nftables out-of-bounds read in nf_osf_match_one()
10/9/2023
linux-headers
core.v0.12.3
Red Hat
Medium
CVE-2023-39189 - Kernel: netfilter: nftables out-of-bounds read in nf_osf_match_one()
10/9/2023
linux-headers
core.v0.12.2
Red Hat
Medium
CVE-2023-39189 - Kernel: netfilter: nftables out-of-bounds read in nf_osf_match_one()
10/9/2023
linux-headers
core.v0.12.4
Red Hat
Medium
CVE-2023-39189 - Kernel: netfilter: nftables out-of-bounds read in nf_osf_match_one()
10/9/2023
linux-headers
core.v0.14.0
Red Hat
Medium
CVE-2023-39189 - Kernel: netfilter: nftables out-of-bounds read in nf_osf_match_one()
10/9/2023
linux-headers
core.v0.13.0
Linux
Unknown
CVE-2023-3867 - ksmbd: fix out of bounds read in smb2_sess_setup
8/16/2025
linux-headers
core.v0.14.1
Linux
Unknown
CVE-2023-3867 - ksmbd: fix out of bounds read in smb2_sess_setup
8/16/2025
Previous
1...
1946
1947
1948
1949
1950
1951
1952
1953
1954
1955
1956
...3723
Next