Since 1999, the Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security fixes, a database and tools to remediate them.
Each user customizes the list of software to track.
As soon as Vigil@nce publishes an alert for one of his software, the user receives a bulletin, containing a simple explanation of the threat, its patches and workarounds.
The administrator then uses the online Vigil@nce diary in order to plan and track the security process.

Our offer Request your free trial

Computer vulnerabilities bulletins published by Vigil@nce

Public vulnerabilities
FortiClient for Linux: four vulnerabilities via IPC Socket
OpenBSD: privilege escalation via ifioctl
Enigmail: information disclosure via Encrypted Mail Response
Angular: Cross Site Scripting via xlink-href Attributes
Cisco Data Center Network Manager: privilege escalation via Command Injection
Oracle MySQL: vulnerabilities of April 2019
libxslt: read/write via xsltCheckRead/xsltCheckWrite
Node.js handlebars: code execution via Lookup Helper
Enigmail: information disclosure via SKS Keyserver Network Attack
X11 Mesa 3D Graphics: information disclosure via Shared Memory
FortiOS: information disclosure via Private Keys
Symantec Endpoint Protection: six vulnerabilities
FreeRADIUS: denial of service via Multithreaded BN_CTX Access
OTRS Help Desk: infinite loop via Long Extensions Filenames
Kubernetes: information disclosure via Container Storage Interface
Linux kernel: memory leak via __feat_register_sp
F5 BIG-IP ASM: information disclosure via JSON Websocket Request
F5 BIG-IP: privilege escalation via Management Port Access
F5 BIG-IP: information disclosure via DNS Rebinding
F5 BIG-IP: information disclosure via restjavad
Recent vulnerabilities
Spring Framework: Cross Site Request Forgery via CORS Preflight Requests
Chrome: multiple vulnerabilities
Cacti: Cross Site Scripting
Spring Framework: file reading via Content-Disposition Reflected File Download
Centreon: privilege escalation via cwrapper_perl
Linux kernel: information disclosure via flow_dissector
Oracle Solaris: vulnerabilities of January 2020
icingaweb2: five vulnerabilities
xar: privilege escalation via Package Signature Validation
QEMU: directory traversal via SLiRP TFTP Server
FontForge: buffer overflow via Type2NotDefSplines
FontForge: use after free via SFD_GetFontMetaData
Lifesize Icon: security improvement
Cisco Data Center Network Manager: privilege escalation via JBoss EAP
QEMU: buffer overflow via SLiRP tcp_emu
Wireshark: denial of service via BT ATT Dissector
Wireshark: denial of service via WASSP Dissector
McAfee ePO: multiple vulnerabilities
Drupal Radix: Cross Site Scripting via Menu Titles Dropdown
Ansible Core: code execution via nxos_file_copy remote_file
Severities: 1 = low, 2 = medium, 3 = important, 4 = critical.

Daily activities

  • Vulnerabilities are discovered daily and published on thousands of internet information sources.
  • Vigil@nce announces these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
  • Your teams secure and protect your networks based on Vigil@nce information and tools.

Your environment

  • A database describing more than 30000 vulnerabilities and their 70000 solutions.
  • A web space where each user defines his preferences.
  • Alert and synthesis e-mails, to inform your teams.
  • A customized tracking of your software and systems.
  • A diary to plan solutions to install, and to monitor the security process of each computer.

Your benefits

  • A customized watch on computer vulnerabilities and their solutions.
  • An experienced team at your service for more than 21 years.
  • A tool to monitor the security process of your networks and computers.
  • A CVE compatible solution.
  • A time saving for your team which concentrates on important tasks.