Toggle navigation
EN
EN
DE
ES
FR
IT
UK
EN
DE
ES
FR
IT
UK
Help
Log In
Help
Log In
EN
EN
DE
ES
FR
IT
UK
EN
DE
ES
FR
IT
UK
Home
Messages
Hashtags
Subgroups
×
×
×
Close
Likes
openembedded-core@lists.openembedded.org
Topics
OE-core CVE metrics for dunfell on Sun 27 Nov 2022 02:30:01 AM HST
×
Close
Search
Date
Date
1 - 1 of 1
previous page
next page
OE-core CVE metrics for dunfell on Sun 27 Nov 2022 02:30:01 AM HST
Steve Sakoman
#173840
Branch: dunfell
New this week: 1 CVEs
CVE-2022-4055 (CVSS3: 7.4 HIGH): xdg-utils
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4055
*
Removed this week: 0 CVEs
Full list: Found 103 unpatched CVEs
CVE-2020-15469 (CVSS3: 2.3 LOW): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15469
*
CVE-2020-15705 (CVSS3: 6.4 MEDIUM): grub:grub-efi:grub-efi-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15705
*
CVE-2020-15859 (CVSS3: 3.3 LOW): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15859
*
CVE-2020-17380 (CVSS3: 6.3 MEDIUM): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17380
*
CVE-2020-25742 (CVSS3: 3.2 LOW): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25742
*
CVE-2020-25743 (CVSS3: 3.2 LOW): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25743
*
CVE-2020-27749 (CVSS3: 6.7 MEDIUM): grub:grub-efi:grub-efi-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27749
*
CVE-2020-27918 (CVSS3: 7.8 HIGH): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27918
*
CVE-2020-29510 (CVSS3: 5.6 MEDIUM): go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-29510
*
CVE-2020-29623 (CVSS3: 3.3 LOW): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-29623
*
CVE-2020-35503 (CVSS3: 6.0 MEDIUM): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-35503
*
CVE-2020-35504 (CVSS3: 6.0 MEDIUM): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-35504
*
CVE-2020-35505 (CVSS3: 4.4 MEDIUM): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-35505
*
CVE-2020-35506 (CVSS3: 6.7 MEDIUM): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-35506
*
CVE-2020-9948 (CVSS3: 8.8 HIGH): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-9948
*
CVE-2020-9951 (CVSS3: 8.8 HIGH): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-9951
*
CVE-2020-9952 (CVSS3: 7.1 HIGH): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-9952
*
CVE-2021-1765 (CVSS3: 6.5 MEDIUM): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1765
*
CVE-2021-1789 (CVSS3: 8.8 HIGH): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1789
*
CVE-2021-1799 (CVSS3: 6.5 MEDIUM): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1799
*
CVE-2021-1801 (CVSS3: 6.5 MEDIUM): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1801
*
CVE-2021-1870 (CVSS3: 9.8 CRITICAL): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1870
*
CVE-2021-20225 (CVSS3: 6.7 MEDIUM): grub:grub-efi:grub-efi-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20225
*
CVE-2021-20233 (CVSS3: 8.2 HIGH): grub:grub-efi:grub-efi-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20233
*
CVE-2021-20269 (CVSS3: 5.5 MEDIUM): kexec-tools
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20269
*
CVE-2021-20295 (CVSS3: 6.5 MEDIUM): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20295
*
CVE-2021-27097 (CVSS3: 7.8 HIGH): u-boot
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27097
*
CVE-2021-27138 (CVSS3: 7.8 HIGH): u-boot
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27138
*
CVE-2021-31879 (CVSS3: 6.1 MEDIUM): wget
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-31879
*
CVE-2021-33194 (CVSS3: 7.5 HIGH): go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33194
*
CVE-2021-33195 (CVSS3: 7.3 HIGH): go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33195
*
CVE-2021-33198 (CVSS3: 7.5 HIGH): go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33198
*
CVE-2021-3409 (CVSS3: 5.7 MEDIUM): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3409
*
CVE-2021-3418 (CVSS3: 6.4 MEDIUM): grub:grub-efi:grub-efi-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3418
*
CVE-2021-3445 (CVSS3: 7.5 HIGH): libdnf
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3445
*
CVE-2021-3507 (CVSS3: 6.1 MEDIUM): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3507
*
CVE-2021-3521 (CVSS3: 4.7 MEDIUM): rpm:rpm-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3521
*
CVE-2021-35937 (CVSS3: 6.4 MEDIUM): rpm:rpm-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-35937
*
CVE-2021-35938 (CVSS3: 7.8 HIGH): rpm:rpm-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-35938
*
CVE-2021-35939 (CVSS3: 7.8 HIGH): rpm:rpm-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-35939
*
CVE-2021-3611 (CVSS3: 6.5 MEDIUM): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3611
*
CVE-2021-36369 (CVSS3: 7.5 HIGH): dropbear
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-36369
*
CVE-2021-3782 (CVSS3: 9.8 CRITICAL): wayland:wayland-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3782
*
CVE-2021-3800 (CVSS3: 7.5 HIGH): glib-2.0:glib-2.0-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3800
*
CVE-2021-3929 (CVSS3: 8.2 HIGH): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3929
*
CVE-2021-3947 (CVSS3: 5.5 MEDIUM): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3947
*
CVE-2021-41772 (CVSS3: 7.5 HIGH): go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41772
*
CVE-2021-42762 (CVSS3: 5.3 MEDIUM): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-42762
*
CVE-2021-44716 (CVSS3: 7.5 HIGH): go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44716
*
CVE-2021-45085 (CVSS3: 6.1 MEDIUM): epiphany
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45085
*
CVE-2021-45086 (CVSS3: 6.1 MEDIUM): epiphany
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45086
*
CVE-2021-45087 (CVSS3: 6.1 MEDIUM): epiphany
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45087
*
CVE-2021-45088 (CVSS3: 6.1 MEDIUM): epiphany
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45088
*
CVE-2021-45481 (CVSS3: 6.5 MEDIUM): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45481
*
CVE-2021-45482 (CVSS3: 6.5 MEDIUM): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45482
*
CVE-2021-45483 (CVSS3: 6.5 MEDIUM): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45483
*
CVE-2021-45944 (CVSS3: 5.5 MEDIUM): ghostscript:ghostscript-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45944
*
CVE-2021-46848 (CVSS3: 9.1 CRITICAL): libtasn1:libtasn1-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-46848
*
CVE-2022-0358 (CVSS3: 7.8 HIGH): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0358
*
CVE-2022-1050 (CVSS3: 8.8 HIGH): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1050
*
CVE-2022-1705 (CVSS3: 6.5 MEDIUM): go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1705
*
CVE-2022-1962 (CVSS3: 5.5 MEDIUM): go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1962
*
CVE-2022-2294 (CVSS3: 8.8 HIGH): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2294
*
CVE-2022-2347 (CVSS3: 7.1 HIGH): u-boot
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2347
*
CVE-2022-23773 (CVSS3: 7.5 HIGH): go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23773
*
CVE-2022-24765 (CVSS3: 7.8 HIGH): git
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24765
*
CVE-2022-24921 (CVSS3: 7.5 HIGH): go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24921
*
CVE-2022-26354 (CVSS3: 3.2 LOW): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-26354
*
CVE-2022-28131 (CVSS3: 7.5 HIGH): go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-28131
*
CVE-2022-28327 (CVSS3: 7.5 HIGH): go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-28327
*
CVE-2022-29154 (CVSS3: 7.4 HIGH): rsync:rsync-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-29154
*
CVE-2022-2953 (CVSS3: 5.5 MEDIUM): tiff
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2953
*
CVE-2022-29536 (CVSS3: 7.5 HIGH): epiphany
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-29536
*
CVE-2022-2962 (CVSS3: 7.8 HIGH): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2962
*
CVE-2022-29804 (CVSS3: 7.5 HIGH): go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-29804
*
CVE-2022-30293 (CVSS3: 7.5 HIGH): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-30293
*
CVE-2022-30580 (CVSS3: 7.8 HIGH): go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-30580
*
CVE-2022-30630 (CVSS3: 7.5 HIGH): go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-30630
*
CVE-2022-30767 (CVSS3: 9.8 CRITICAL): u-boot
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-30767
*
CVE-2022-32893 (CVSS3: 8.8 HIGH): webkitgtk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-32893
*
CVE-2022-34835 (CVSS3: 9.8 CRITICAL): u-boot
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-34835
*
CVE-2022-3550 (CVSS3: 8.8 HIGH): xserver-xorg
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3550
*
CVE-2022-3551 (CVSS3: 6.5 MEDIUM): xserver-xorg
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3551
*
CVE-2022-3553 (CVSS3: 6.5 MEDIUM): xserver-xorg
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3553
*
CVE-2022-3570 (CVSS3: 5.5 MEDIUM): tiff
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3570
*
CVE-2022-3597 (CVSS3: 6.5 MEDIUM): tiff
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3597
*
CVE-2022-3598 (CVSS3: 6.5 MEDIUM): tiff
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3598
*
CVE-2022-3599 (CVSS3: 6.5 MEDIUM): tiff
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3599
*
CVE-2022-3626 (CVSS3: 6.5 MEDIUM): tiff
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3626
*
CVE-2022-3627 (CVSS3: 6.5 MEDIUM): tiff
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3627
*
CVE-2022-3705 (CVSS3: 7.5 HIGH): vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3705
*
CVE-2022-3872 (CVSS3: 8.6 HIGH): qemu:qemu-native:qemu-system-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3872
*
CVE-2022-39177 (CVSS3: 8.8 HIGH): bluez5
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-39177
*
CVE-2022-39253 (CVSS3: 5.5 MEDIUM): git
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-39253
*
CVE-2022-39260 (CVSS3: 8.8 HIGH): git
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-39260
*
CVE-2022-39377 (CVSS3: 9.8 CRITICAL): sysstat
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-39377
*
CVE-2022-3970 (CVSS3: 9.8 CRITICAL): tiff
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3970
*
CVE-2022-4055 (CVSS3: 7.4 HIGH): xdg-utils
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4055
*
CVE-2022-41715 (CVSS3: 7.5 HIGH): go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41715
*
CVE-2022-41716 (CVSS3: 7.5 HIGH): go:go-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41716
*
CVE-2022-43995 (CVSS3: 7.1 HIGH): sudo
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-43995
*
CVE-2022-44638 (CVSS3: 8.8 HIGH): pixman:pixman-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-44638
*
CVE-2022-45061 (CVSS3: 7.5 HIGH): python3:python3-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-45061
*
For further information see:
https://autobuilder.yocto.io/pub/non-release/patchmetrics/
More
All Messages By This Member
×
Close
Verify Delete
Are you sure you wish to delete this message from the message archives of openembedded-core@lists.openembedded.org?
This cannot be undone.
×
Close
Verify Repost
Are you sure you wish to repost this message?
×
Close
Report Message
Reason
Report to Moderators
I think this message isn't appropriate for our group. The Group moderators are responsible for maintaining their community and can address these issues.
Report to Open Embedded Support
I think this violates the Terms of Service. This includes: harm to minors, violence or threats, harassment or privacy invasion, impersonation or misrepresentation, fraud or phishing.
Note:
Your email address is included with the abuse report.
×
Close
Split Topic
The new topic will begin with this message. Subject of the new topic:
1 - 1 of 1
previous page
1
next page
Previous Topic
Next Topic
More Options
More
Home
Hashtags
Subgroups
Terms
Toggle navigation
Terms
©
2023
Groups.io