• Docs
  • Vulnerability Notifications
  • Create a BSP
  • Register
  • Log in


Timesys Vigiles: Real-time security vulnerability monitoring for more secure products


With the increasing rate of security vulnerabilities (CVEs) and the unpredictability of discoveries, the manual process of keeping up with the newly discovered CVEs for your device software is not feasible. Timesys helps reduce the time and costs associated with maintaining software security through its automated Vigiles Security Monitoring and Notification Service.


LEARN HOW VIGILES WORKS COMPARE VIGILES VERSIONS START TODAY FOR FREE

Demo Notice

This is a sample version of a real Vigiles CVE Dashboard. Here you can get a feel for the dashboard, but you can not make any changes. To learn more read the FAQ below.

If you already have a LinuxLink account, log in to see your personal dashboard.
Vigiles User Guide

Apart from this demo, you can view our full Vigiles User Guide to learn more about Vigiles features and how to use them.

Yocto Manifest
Description: Demo
Image: core-image-sato
Machine: qemux86
Distro: warrior (2.7.1)
SBOM Uploaded: 03/18/20 05:41 PM UTC
Scan Performed: 03/18/20 07:36 PM UTC

Linux OS and BSP Maintenance

Kernel patches are included in our Linux OS and BSP Maintenance service.

Both the Timesys Linux OS and BSP Maintenance team and the Timesys security team have the expertise to maintain the security of your BSP, on your custom hardware, allowing your team to focus on improving products to expand your customer base.

Learn More

Summary

  • 238
    Unfixed
    79
    User space
    159
    Kernel
  • 72
    Fixed
    72
    User space
    0
    Kernel
  • 132
    High/Critical CVSS (Unfixed)
    47
    User space
    85
    Kernel
  • 0
    Filtered CVEs
    0
    High/Critical Unfixed
    0
    Low/Med/Early Unfixed
    0
    Fixed
Unfixed CVE Count by Severity
Packages with Known CVEs
Packages

Show Unfixed Only

Package Version License Unfixed Fixed Whitelisted Filtered CVEs
CVEs

 Filters 




Package Version CVE ID Status CVSSv3 Attack Vector
Filtered CVEs - click to see CVEs that have been filtered
Package Version CVE ID CVSS Reason for filtering


NOTES:
– CVSS columns highlighted in red have a high (7.0+) or critical (9.0+) CVSSv3 base score.
– Whitelisted packages or CVEs have been explicitly ignored by the build configuration.
– Toolchain packages may also be present in the root filesystem in some cases (such as when building on the target device is supported by the image).
– Notes and whitelist are applied to all reports in this product that contain the same CVE entry.


About the Vigiles CVE Dashboard
  • What is this page?

    The Vigiles CVE Dashboard shows you all the CVEs affecting a specific SBOM at the time the scan was performed. It allows you to filter, whitelist, and make notes about individual CVEs. You can also export the data, and download the SBOM from this page.
  • What is the Summary section, and what can I do with it?

    Located at the top of the dashboard, the summary gives you an “at-a-glance” view of the number of CVEs in the scan results, and breaks the CVE counts down by status and severity. You can click the labels in each chart's legend to toggle what information is displayed.
  • How can I learn more about a CVE?

    For more details about any CVE, simply click on the associated CVE ID in the CVEs table to be directed to more information about the vulnerability.

Want to learn more about Timesys Vigiles Security Monitoring and Notification?

VIEW VIGILES OPTIONS

Send Feedback

Feature Request / Comments Bug Report

Use this form to let us know if you are experiencing an issue.
If you require a response, you should open a Support Ticket instead.



Get Help

We have compiled an FAQ, to help you find what you're looking for as quickly as possible. Click here to view it.

If you still have questions after reading the FAQ, click here to request support.
This website uses cookies to understand how you use our site and to improve your experience. By continuing to use our site, you accept our use of cookies, Privacy Policy and Terms of Use. To avoid the collection of cookie-based information, you can visit this site with cookies turned off in your browser. However, by disabling cookies, some features of the site will not work.
Accept
Read More
Copyright © 2023 Timesys Corporation. All Rights Reserved. Privacy Policy | Cookie Policy | Eula | Terms of Service | Terms of Sale
Yocto Project and all related marks and logos are registered trademarks of The Linux Foundation. This website is not, in any way, endorsed by the Yocto Project or The Linux Foundation.