Since 1999, the Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security fixes, a database and tools to remediate them.
Each user customizes the list of software to track.
As soon as Vigil@nce publishes an alert for one of his software, the user receives a bulletin, containing a simple explanation of the threat, its patches and workarounds.
The administrator then uses the online Vigil@nce diary in order to plan and track the security process.


Our offer Free trial
Public vulnerabilities
1 NetBSD: information disclosure via Kern.arandom Sysctl Forward Secrecy
1 SQLite: denial of service via TK_COLUMN sqlite3ExprCodeTarget
1 SQLite: denial of service via Sub-Select DISTINCT Window
2 Dell EMC Avamar: external XML entity injection
2 OpenStack Octavia: privilege escalation via Client Certificate Not Required
2 Linux kernel: use after free via allocate_trace_buffer
2 Ruby OpenID: privilege escalation via Discovery URL Change
3 Evolution: information disclosure via Spoofed OpenPGP Signatures
2 Zabbix: privilege escalation via Dashboard Page
2 libpng: memory leak via png_malloc_warn
2 libsoup: out-of-bounds memory reading via soup_ntlm_parse_challenge
2 libopenmpt: buffer overflow via ModPlug_InstrumentName
1 Linux kernel: NULL pointer dereference via unregister_snap_client
2 Junos OS EX: privilege escalation via Veriexec Signature
2 Junos OS SRX: denial of service via PIM
2 Junos OS EX: directory traversal via NG-RE
2 Junos OS: information disclosure via PKI key pairs
2 Junos OS SRX1500: denial of service via srxpfe
2 Junos OS: Cross Site Scripting via J-Web
2 Junos OS: privilege escalation via Clear Text Credentials
Recent vulnerabilities
2 Linux kernel: denial of service via Inter-Access Point Protocol
2 Node.js npm CLI: three vulnerabilities
2 Node.js bin-links: three vulnerabilities
2 SPIP: SQL injection
2 Telerik UI for ASP.NET AJAX: code execution via RadAsyncUpload JavaScriptSerializer Deserialization
2 OpenBSD: privilege escalation via ld.so suid/sgid LD_LIBRARY_PATH
3 Drupal Webform: multiple vulnerabilities
2 Drupal Permissions by Term: information disclosure
2 Drupal Modal Page: privilege escalation
2 Drupal Taxonomy Access Fix: privilege escalation
2 Drupal Smart Trim: Cross Site Scripting via Text Summary Fields
2 Node.js serialize-javascript: Cross Site Scripting
2 Shadowsocks-libev: two vulnerabilities
2 RSA Authentication Manager: vulnerability via iDRAC
2 WebSphere AS Liberty: Cross Site Scripting via Web UI
2 RUGGEDCOM ROS: two vulnerabilities
2 Siemens SIMATIC: Man-in-the-Middle via 102/tcp
4 Google Chrome: multiple vulnerabilities
2 Xen: memory corruption via AMD IOMMU Pagetables Dynamic Height
2 Xen: privilege escalation via Restartable PV Type Change
Severities: 1 = low, 2 = medium, 3 = important, 4 = critical.

Daily activities

  • Vulnerabilities are discovered daily and published on thousands of internet information sources.
  • Vigil@nce announces these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
  • Your teams secure and protect your networks based on Vigil@nce information and tools.

Your environment

  • A database describing more than 25000 vulnerabilities and their 60000 solutions.
  • A web space where each user defines his preferences.
  • Alert and synthesis e-mails, to inform your teams.
  • A customized tracking of your software and systems.
  • A diary to plan solutions to install, and to monitor the security process of each computer.

Your benefits

  • A customized watch on computer vulnerabilities and their solutions.
  • An experienced team at your service for more than 20 years.
  • A tool to monitor the security process of your networks and computers.
  • A CVE compatible solution.
  • A time saving for your team which concentrates on important tasks.