| Version | |
|---|---|
| core.v0.17.2 (latest) | |
| core.v0.17.1 | |
| core.v0.17.0 | |
| core.v0.16.2 | |
| core.v0.16.1 | |
| core.v0.16.0 | |
| core.v0.15.1 | |
| core.v0.15.0 | |
| core.v0.14.1 | |
| core.v0.14.0 | |
| core.v0.13.0 | |
| core.v0.12.4 | |
| core.v0.12.3 | |
| core.v0.12.2 |
| Product | For package | Vendor | Severity | CVE | Published |
|---|---|---|---|---|---|
| linux-headers | core.v0.14.1 | n/a | Medium | CVE-2023-3159 | 6/12/2023 |
| linux-headers | core.v0.14.0 | n/a | Medium | CVE-2023-3159 | 6/12/2023 |
| linux-headers | core.v0.12.2 | n/a | Medium | CVE-2023-3159 | 6/12/2023 |
| linux-headers | core.v0.12.4 | n/a | Medium | CVE-2023-3159 | 6/12/2023 |
| linux-headers | core.v0.12.3 | n/a | Medium | CVE-2023-3159 | 6/12/2023 |
| linux-headers | core.v0.13.0 | n/a | Medium | CVE-2023-3159 | 6/12/2023 |
| linux-headers | core.v0.14.1 | n/a | High | CVE-2023-31436 | 4/28/2023 |
| linux-headers | core.v0.12.4 | n/a | High | CVE-2023-31436 | 4/28/2023 |
| linux-headers | core.v0.12.3 | n/a | High | CVE-2023-31436 | 4/28/2023 |
| linux-headers | core.v0.12.2 | n/a | High | CVE-2023-31436 | 4/28/2023 |
| linux-headers | core.v0.14.0 | n/a | High | CVE-2023-31436 | 4/28/2023 |
| linux-headers | core.v0.13.0 | n/a | High | CVE-2023-31436 | 4/28/2023 |
| linux-headers | core.v0.13.0 | n/a | High | CVE-2023-3141 | 6/9/2023 |
| linux-headers | core.v0.14.1 | n/a | High | CVE-2023-3141 | 6/9/2023 |
| linux-headers | core.v0.12.3 | n/a | High | CVE-2023-3141 | 6/9/2023 |
| linux-headers | core.v0.14.0 | n/a | High | CVE-2023-3141 | 6/9/2023 |
| linux-headers | core.v0.12.4 | n/a | High | CVE-2023-3141 | 6/9/2023 |
| linux-headers | core.v0.12.2 | n/a | High | CVE-2023-3141 | 6/9/2023 |
| linux-headers | core.v0.12.4 | Linux | High | CVE-2023-31248 - Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability | 7/5/2023 |
| linux-headers | core.v0.12.2 | Linux | High | CVE-2023-31248 - Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability | 7/5/2023 |