Apart from this demo, you can view our full Vigiles User Guide to learn more about Vigiles features and how to use them.
Distro: warrior (2.7.1)
Manifest Uploaded: 03/18/20 05:41 PM UTC
Scan Performed: 03/18/20 07:36 PM UTC
Kernel patches are included in our BSP Lifecycle Maintenance service.
The Timesys BSP Lifecycle Maintenance and Timesys TRST teams have the expertise to maintain the security of your BSP, on your custom hardware, allowing your team to focus on improving products to expand your customer base.Learn More
132High/Critical CVSS (Unfixed)47User space85Kernel
0Filtered CVEs0Unfixed0Fixed0High/Critical CVSS (Unfixed)
Show Unfixed Only
|Package||CVE ID||Status||CVSSv3||Attack Vector|
|Package||Version||CVE ID||CVSS||Reason for filtering|
– CVSS columns highlighted in red have a high (7.0+) or critical (9.0+) CVSSv3 base score.
– Whitelisted packages or CVEs have been explicitly ignored by the build configuration.
– Toolchain packages may also be present in the root filesystem in some cases (such as when building on the target device is supported by the image).
– Notes and whitelist are applied to all reports in this product that contain the same CVE entry.
What is this page?
The Vigiles CVE Dashboard shows you all the CVEs affecting a specific manifest at the time the scan was performed. It allows you to filter, whitelist, and make notes about individual CVEs. You can also export the data, and download the manifest from this page.
What is the Summary section, and what can I do with it?
Located at the top of the dashboard, the summary gives you an “at-a-glance” view of the number of CVEs in the scan results, and breaks the CVE counts down by status and severity. You can click the labels in each chart's legend to toggle what information is displayed.
How can I learn more about a CVE?
For more details about any CVE, simply click on the associated CVE ID in the CVEs table to be directed to more information about the vulnerability.