Since 1999, the Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security fixes, a database and tools to remediate them.
Each user customizes the list of software to track. As soon as Vigil@nce publishes an alert for one of his software, the user receives a vigilance bulletin, containing a simple explanation of the threat, its patches and workarounds.
The administrator then uses the online Vigil@nce diary in order to plan and track the security process.

Our offer Request your free trial

Computer vulnerabilities bulletins published by Vigil@nce

Public vulnerabilities
Apache httpd mod_proxy_ftp: denial of service via FTP Backend
nbdkit: denial of service via Premature Back-end Opening
GnuTLS: information disclosure via DTLS No Client Randomness
Kubernetes: overload via kube-apiserver YAML
WebSphere AS Liberty: Cross Site Scripting
pam-krb5: buffer overflow via Initiated Prompting
Tinyproxy: denial of service via Kill
Symfony: information disclosure via ErrorHandler
Symfony: privilege escalation via Firewall accessDecisionManager
Symfony: spoofing via Content-Type Cache Poisoning
Linux kernel: memory corruption via BPF JMP32 Instructions
GraphicsMagick: buffer overflow via HuffmanDecodeImage
Stormshield Network Security: four vulnerabilities of SMC
Apache Tika: overload via PSD File
Tor: memory leak via circpad_setup_machine_on_circ
dcraw: buffer overflow via find_green
libexif12: denial of service
iproute2: buffer overflow
Ghostscript: four vulnerabilities
OpenBSD: denial of service via wscons
Recent vulnerabilities
VMware ESXi, Workstation: two vulnerabilities
FreeRDP: three vulnerabilities
ISC BIND: denial of service via tsig.c
Python email.headerregistry.Address: message corruption via a end of line injection
Apple macOS: multiple vulnerabilities
Centreon Web: Cross Site Scripting via widgets
SQLite: three vulnerabilities
QEMU: denial of service via the MegaRAID SAS 8708EM device driver
QEMU: denial of service via the es1370 device driver
knot-resolver: denial of service via NXNSAttack
Drupal Password Reset Landing Page: privilege escalation
Drupal Commerce: information disclosure
Apple iOS: privilege escalation
Joomla Fabrik: vulnerability
Linux kernel: SELinux validation bypass for netlink messages
QEMU: denial of service via SD Memory Card
libEMF: multiple vulnerabilities
Apple iOS: multiple vulnerabilities
JasPer: denial of service via jpc_dec_process_sot
Fortinet FortiClient: file corruption
Severities: 1 = low, 2 = medium, 3 = important, 4 = critical.

Daily activities

  • Vulnerabilities are discovered daily and published on thousands of internet information sources.
  • Vigil@nce announces these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
  • Your teams secure and protect your networks based on Vigil@nce information and tools.

Your environment

  • A database describing more than 30000 vulnerabilities and their 70000 solutions.
  • A web space where each user defines his vigilance preferences.
  • Alert and synthesis e-mails, to inform your teams.
  • A customized tracking of your software and systems.
  • A diary to plan solutions to install, and to monitor the security process of each computer.

Your benefits

  • A customized watch on computer vulnerabilities and their solutions.
  • An experienced team at your service for more than 21 years.
  • A tool to monitor the security process of your networks and computers.
  • A CVE compatible solution.
  • A time saving for your team which concentrates on important tasks.