| Version | |
|---|---|
| vhd-format.0.9.1 (latest) | |
| vhd-format.0.13.0 | |
| vhd-format.0.12.3 | |
| vhd-format.0.12.2 | |
| vhd-format.0.12.1 | |
| vhd-format.0.12.0 |
| Product | For package | Vendor | Severity | CVE | Published |
|---|---|---|---|---|---|
| linux-headers | vhd-format.0.12.1 | n/a | Medium | CVE-2023-33203 | 5/18/2023 |
| linux-headers | vhd-format.0.12.0 | n/a | Medium | CVE-2023-33203 | 5/18/2023 |
| linux-headers | vhd-format.0.12.3 | n/a | Medium | CVE-2023-33203 | 5/18/2023 |
| linux-headers | vhd-format.0.13.0 | n/a | Medium | CVE-2023-33203 | 5/18/2023 |
| linux-headers | vhd-format.0.12.3 | n/a | High | CVE-2023-3317 | 6/23/2023 |
| linux-headers | vhd-format.0.12.2 | n/a | High | CVE-2023-3317 | 6/23/2023 |
| linux-headers | vhd-format.0.12.1 | n/a | High | CVE-2023-3317 | 6/23/2023 |
| linux-headers | vhd-format.0.13.0 | n/a | High | CVE-2023-3317 | 6/23/2023 |
| linux-headers | vhd-format.0.9.1 | n/a | High | CVE-2023-3317 | 6/23/2023 |
| linux-headers | vhd-format.0.12.0 | n/a | High | CVE-2023-3317 | 6/23/2023 |
| linux-headers | vhd-format.0.12.0 | n/a | High | CVE-2023-3312 | 6/19/2023 |
| linux-headers | vhd-format.0.12.1 | n/a | High | CVE-2023-3312 | 6/19/2023 |
| linux-headers | vhd-format.0.12.2 | n/a | High | CVE-2023-3312 | 6/19/2023 |
| linux-headers | vhd-format.0.9.1 | n/a | High | CVE-2023-3312 | 6/19/2023 |
| linux-headers | vhd-format.0.13.0 | n/a | High | CVE-2023-3312 | 6/19/2023 |
| linux-headers | vhd-format.0.12.3 | n/a | High | CVE-2023-3312 | 6/19/2023 |
| linux-headers | vhd-format.0.12.0 | MediaTek, Inc. | High | CVE-2023-32820 | 10/2/2023 |
| linux-headers | vhd-format.0.12.1 | MediaTek, Inc. | High | CVE-2023-32820 | 10/2/2023 |
| linux-headers | vhd-format.0.9.1 | MediaTek, Inc. | High | CVE-2023-32820 | 10/2/2023 |
| linux-headers | vhd-format.0.12.2 | MediaTek, Inc. | High | CVE-2023-32820 | 10/2/2023 |