Home
Packages
Vulnerabilities
Vendors
Report
Policy
Login
Signup
« List of all packages
core
Subscribe
Opam page:
https://opam.ocaml.org/packages/core/
Versions
Version
core.v0.17.1
(latest)
Subscribe
core.v0.17.0
Subscribe
core.v0.16.2
Subscribe
core.v0.16.1
Subscribe
core.v0.16.0
Subscribe
core.v0.15.1
Subscribe
core.v0.15.0
Subscribe
core.v0.14.1
Subscribe
core.v0.14.0
Subscribe
core.v0.13.0
Subscribe
core.v0.12.4
Subscribe
core.v0.12.3
Subscribe
core.v0.12.2
Subscribe
Vulnerable external dependencies (67728)
Product
For package
Vendor
Severity
CVE
Published
linux-headers
core.v0.12.4
Linux
High
CVE-2025-21915 - cdx: Fix possible UAF error in driver_override_show()
4/1/2025
linux-headers
core.v0.12.3
Linux
High
CVE-2025-21915 - cdx: Fix possible UAF error in driver_override_show()
4/1/2025
linux-headers
core.v0.13.0
Linux
High
CVE-2025-21915 - cdx: Fix possible UAF error in driver_override_show()
4/1/2025
linux-headers
core.v0.14.1
Linux
High
CVE-2025-21915 - cdx: Fix possible UAF error in driver_override_show()
4/1/2025
linux-headers
core.v0.14.0
Linux
High
CVE-2025-21915 - cdx: Fix possible UAF error in driver_override_show()
4/1/2025
linux-headers
core.v0.12.2
Linux
High
CVE-2025-21915 - cdx: Fix possible UAF error in driver_override_show()
4/1/2025
linux-headers
core.v0.12.3
Linux
Unknown
CVE-2025-21914 - slimbus: messaging: Free transaction ID in delayed interrupt scenario
4/1/2025
linux-headers
core.v0.12.2
Linux
Unknown
CVE-2025-21914 - slimbus: messaging: Free transaction ID in delayed interrupt scenario
4/1/2025
linux-headers
core.v0.14.1
Linux
Unknown
CVE-2025-21914 - slimbus: messaging: Free transaction ID in delayed interrupt scenario
4/1/2025
linux-headers
core.v0.12.4
Linux
Unknown
CVE-2025-21914 - slimbus: messaging: Free transaction ID in delayed interrupt scenario
4/1/2025
linux-headers
core.v0.13.0
Linux
Unknown
CVE-2025-21914 - slimbus: messaging: Free transaction ID in delayed interrupt scenario
4/1/2025
linux-headers
core.v0.14.0
Linux
Unknown
CVE-2025-21914 - slimbus: messaging: Free transaction ID in delayed interrupt scenario
4/1/2025
linux-headers
core.v0.12.2
Linux
Unknown
CVE-2025-21913 - x86/amd_nb: Use rdmsr_safe() in amd_get_mmconfig_range()
4/1/2025
linux-headers
core.v0.12.3
Linux
Unknown
CVE-2025-21913 - x86/amd_nb: Use rdmsr_safe() in amd_get_mmconfig_range()
4/1/2025
linux-headers
core.v0.12.4
Linux
Unknown
CVE-2025-21913 - x86/amd_nb: Use rdmsr_safe() in amd_get_mmconfig_range()
4/1/2025
linux-headers
core.v0.13.0
Linux
Unknown
CVE-2025-21913 - x86/amd_nb: Use rdmsr_safe() in amd_get_mmconfig_range()
4/1/2025
linux-headers
core.v0.14.0
Linux
Unknown
CVE-2025-21913 - x86/amd_nb: Use rdmsr_safe() in amd_get_mmconfig_range()
4/1/2025
linux-headers
core.v0.14.1
Linux
Unknown
CVE-2025-21913 - x86/amd_nb: Use rdmsr_safe() in amd_get_mmconfig_range()
4/1/2025
linux-headers
core.v0.12.3
Linux
Unknown
CVE-2025-21912 - gpio: rcar: Use raw_spinlock to protect register access
4/1/2025
linux-headers
core.v0.12.4
Linux
Unknown
CVE-2025-21912 - gpio: rcar: Use raw_spinlock to protect register access
4/1/2025
Previous
1...
368
369
370
371
372
373
374
375
376
377
378
...3387
Next