Since 1999, the Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security fixes, a database and tools to remediate them.
Each user customizes the list of software to track. As soon as Vigil@nce publishes an alert for one of his software, the user receives a vigilance bulletin, containing a simple explanation of the threat, its patches and workarounds.
The administrator then uses the online Vigil@nce diary in order to plan and track the security process.


Our offer Request your free trial

Computer vulnerabilities bulletins published by Vigil@nce

Public vulnerabilities
TYPO3 Kitodo.Presentation: Cross Site Scripting
Linux kernel: NULL pointer dereference via mm/hugetlb.c
TeamViewer: vulnerability via URI Handling
IBM Informix Server: privilege escalation via bts_tracefile
IBM MQ: buffer overflow via Channel Processing
LuaJit: out-of-bounds memory reading via Frame Traversal
TYPO3 Core: information disclosure via Backend User Interface
TYPO3 Core: privilege escalation via HMAC-SHA1
PostgreSQL JDBC: external XML entity injection
Grafana: Cross Site Scripting via Snapshot Original Dashboard Link
Linux kernel: buffer overflow via vgacon_scrollback_update
Bootstrap-3-Typeahead: Cross Site Scripting via highlighter
Mozilla NSS: information disclosure via Multi-part ChaCha20
Mozilla NSS: information disclosure via Scalar Padding
Mozilla NSS: information disclosure via P521
Mozilla NSS: information disclosure via P384
Joomla Joomanager: vulnerability
MilkyTracker: use after free via PlayerGeneric
OpenSSH: code execution via scp Backticks
Go: Man-in-the-Middle via Certificate Verify KeyUsages
Recent vulnerabilities
QEMU: NULL pointer dereference via ide_cancel_dma_sync
QEMU: NULL pointer dereference via pci_change_irq_level
QEMU: NULL pointer dereference via fdctrl_read_data/fdctrl_write_data
Microsoft Windows, Samba: privilege escalation via Active Directory Domain Services Zerologon
DPDK: five vulnerabilities via Vhost Crypto
Go: Cross Site Scripting via CGI/FCGI handlers
Bluetooth Firmware: memory corruption via Sweyntooth/Spectra
Linux kernel: overload via Zero Length Bvec
Linux kernel: privilege escalation via net/nfc/rawsock.c
Brocade FabricOS: privilege escalation via REST API Reflected Input
Brocade FabricOS: privilege escalation via CLI Secccrypptocfg
Brocade FabricOS: buffer overflow via REST API
Brocade FabricOS: privilege escalation via CLI Shell Variables
Brocade FabricOS: privilege escalation via Seccryptocfg Templates
Brocade FabricOS: privilege escalation via Firmware Download Password
Brocade FabricOS: privilege escalation via Supportlink CLI Password Field
Brocade FabricOS: privilege escalation via Host Header Injection
Brocade FabricOS: denial of service via Management Interface
Brocade FabricOS: Cross Site Scripting via HTTP Management Interface
Yaws: code execution via CGI
Severities: 1 = low, 2 = medium, 3 = important, 4 = critical.

Daily activities

  • Vulnerabilities are discovered daily and published on thousands of internet information sources.
  • Vigil@nce announces these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
  • Your teams secure and protect your networks based on Vigil@nce information and tools.

Your environment

  • A database describing more than 30000 vulnerabilities and their 70000 solutions.
  • A web space where each user defines his vigilance preferences.
  • Alert and synthesis e-mails, to inform your teams.
  • A customized tracking of your software and systems.
  • A diary to plan solutions to install, and to monitor the security process of each computer.

Your benefits

  • A customized watch on computer vulnerabilities and their solutions.
  • An experienced team at your service for more than 21 years.
  • A tool to monitor the security process of your networks and computers.
  • A CVE compatible solution.
  • A time saving for your team which concentrates on important tasks.