Since 1999, the Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security fixes, a database and tools to remediate them.
Each user customizes the list of software to track. As soon as Vigil@nce publishes an alert for one of his software, the user receives a vigilance bulletin, containing a simple explanation of the threat, its patches and workarounds.
The administrator then uses the online Vigil@nce diary in order to plan and track the security process.


Our offer Request your free trial

Computer vulnerabilities bulletins published by Vigil@nce

Public vulnerabilities
php-pear: two vulnerabilities
pngcheck: buffer overflow via check_chunk_name
CImg: buffer overflow
FasterXML Jackson Databind: code execution via br.com.anteros-Anteros-DBC
Node.js jquery: Cross Site Scripting via Script Whitespace
GNU binutils: multiple vulnerabilities
Exim: code execution via Sort Expansion Operator
binutils: NULL pointer dereference via bfd_pef_scan_start_address
binutils: NULL pointer dereference via bfd_pef_parse_symbols
binutils: information disclosure via tic4x_print_cond
OpenSSL: NULL pointer dereference via SSL_check_chain
FortiGate: information disclosure via Events Log Entries
AMD Processors: information disclosure via Running Average Power Limit
HCL Notes: denial of service via Email Message
VMware ESXi/Workstation: two vulnerabilities
Tor: out-of-bounds memory reading via NSS
Centreon Web: multiple vulnerabilities
Node.js semantic-release: information disclosure via Secrets
Hibernate ORM: SQL injection via Comments
F5 BIG-IP APM/Edge: privilege escalation via Edge Client
Recent vulnerabilities
QEMU: read-write access via virtiofsd
yast2-multipath: file corruption
Xen: denial of service via X86 HVM IRQ Vector
Check Point SmartConsole: privilege escalation
Cisco SD-WAN vEdge: information disclosure via Iperf Tool
Cisco SD-WAN vEdge: five vulnerabilities
Cisco SD-WAN vEdge: privilege escalation via Command Injection
Cisco SD-WAN vEdge: two vulnerabilities
Cisco Web Security Appliance: Cross Site Scripting
Cisco Unified Communications Manager: four vulnerabilities
Cisco ESA/SMA/WSA: information disclosure via General Purpose API
Cisco Data Center Network Manager: Cross Site Scripting via Network Operator
Cisco Data Center Network Manager: privilege escalation via Server-Side Request Forgery
Cisco Data Center Network Manager: SQL injection via REST API Endpoints
Cisco Data Center Network Manager: information disclosure via Logging Subsystem
Cisco Data Center Network Manager: Man-in-the-Middle via Certificate Validation
Cisco Data Center Network Manager: privilege escalation via Authorization Bypass
Cisco Data Center Network Manager: three vulnerabilities via REST API
Cisco ASR 5000: denial of service via StarOS IPv4
Archive_Tar: directory traversal via Tar.php
Severities: 1 = low, 2 = medium, 3 = important, 4 = critical.

Daily activities

  • Vulnerabilities are discovered daily and published on thousands of internet information sources.
  • Vigil@nce announces these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
  • Your teams secure and protect your networks based on Vigil@nce information and tools.

Your environment

  • A database describing more than 30000 vulnerabilities and their 70000 solutions.
  • A web space where each user defines his vigilance preferences.
  • Alert and synthesis e-mails, to inform your teams.
  • A customized tracking of your software and systems.
  • A diary to plan solutions to install, and to monitor the security process of each computer.

Your benefits

  • A customized watch on computer vulnerabilities and their solutions.
  • An experienced team at your service for more than 22 years.
  • A tool to monitor the security process of your networks and computers.
  • A CVE compatible solution.
  • A time saving for your team which concentrates on important tasks.