Home
Packages
Vulnerabilities
Vendors
Report
Policy
Login
Signup
« List of all packages
core
Subscribe
Opam page:
https://opam.ocaml.org/packages/core/
Versions
Version
core.v0.17.1
(latest)
Subscribe
core.v0.17.0
Subscribe
core.v0.16.2
Subscribe
core.v0.16.1
Subscribe
core.v0.16.0
Subscribe
core.v0.15.1
Subscribe
core.v0.15.0
Subscribe
core.v0.14.1
Subscribe
core.v0.14.0
Subscribe
core.v0.13.0
Subscribe
core.v0.12.4
Subscribe
core.v0.12.3
Subscribe
core.v0.12.2
Subscribe
Vulnerable external dependencies (67716)
Product
For package
Vendor
Severity
CVE
Published
linux-headers
core.v0.12.4
Linux
High
CVE-2024-50129 - net: pse-pd: Fix out of bound for loop
11/5/2024
linux-headers
core.v0.13.0
Linux
High
CVE-2024-50129 - net: pse-pd: Fix out of bound for loop
11/5/2024
linux-headers
core.v0.14.0
Linux
High
CVE-2024-50129 - net: pse-pd: Fix out of bound for loop
11/5/2024
linux-headers
core.v0.14.1
Linux
High
CVE-2024-50129 - net: pse-pd: Fix out of bound for loop
11/5/2024
linux-headers
core.v0.12.3
Linux
High
CVE-2024-50129 - net: pse-pd: Fix out of bound for loop
11/5/2024
linux-headers
core.v0.12.2
Linux
High
CVE-2024-50129 - net: pse-pd: Fix out of bound for loop
11/5/2024
linux-headers
core.v0.12.2
Linux
High
CVE-2024-50128 - net: wwan: fix global oob in wwan_rtnl_policy
11/5/2024
linux-headers
core.v0.12.3
Linux
High
CVE-2024-50128 - net: wwan: fix global oob in wwan_rtnl_policy
11/5/2024
linux-headers
core.v0.13.0
Linux
High
CVE-2024-50128 - net: wwan: fix global oob in wwan_rtnl_policy
11/5/2024
linux-headers
core.v0.14.1
Linux
High
CVE-2024-50128 - net: wwan: fix global oob in wwan_rtnl_policy
11/5/2024
linux-headers
core.v0.12.4
Linux
High
CVE-2024-50128 - net: wwan: fix global oob in wwan_rtnl_policy
11/5/2024
linux-headers
core.v0.14.0
Linux
High
CVE-2024-50128 - net: wwan: fix global oob in wwan_rtnl_policy
11/5/2024
linux-headers
core.v0.12.4
Linux
High
CVE-2024-50127 - net: sched: fix use-after-free in taprio_change()
11/5/2024
linux-headers
core.v0.14.1
Linux
High
CVE-2024-50127 - net: sched: fix use-after-free in taprio_change()
11/5/2024
linux-headers
core.v0.14.0
Linux
High
CVE-2024-50127 - net: sched: fix use-after-free in taprio_change()
11/5/2024
linux-headers
core.v0.13.0
Linux
High
CVE-2024-50127 - net: sched: fix use-after-free in taprio_change()
11/5/2024
linux-headers
core.v0.12.2
Linux
High
CVE-2024-50127 - net: sched: fix use-after-free in taprio_change()
11/5/2024
linux-headers
core.v0.12.3
Linux
High
CVE-2024-50127 - net: sched: fix use-after-free in taprio_change()
11/5/2024
linux-headers
core.v0.12.4
Linux
High
CVE-2024-50126 - net: sched: use RCU read-side critical section in taprio_dump()
11/5/2024
linux-headers
core.v0.14.1
Linux
High
CVE-2024-50126 - net: sched: use RCU read-side critical section in taprio_dump()
11/5/2024
Previous
1...
704
705
706
707
708
709
710
711
712
713
714
...3386
Next