Since 1999, the Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security fixes, a database and tools to remediate them.
Each user customizes the list of software to track. As soon as Vigil@nce publishes an alert for one of his software, the user receives a vigilance bulletin, containing a simple explanation of the threat, its patches and workarounds.
The administrator then uses the online Vigil@nce diary in order to plan and track the security process.

Our offer Request your free trial

Computer vulnerabilities bulletins published by Vigil@nce

Public vulnerabilities
Ghostscript: buffer overflow via jbig2_image_compose
GNU Mailman: Cross Site Scripting via Options Content Injection
Cisco ASA: denial of service via DHCP
Cisco Unified Computing System Director: privilege escalation
MongoDB Server: privilege escalation via serialization
Cisco ASA: denial of service via BGP
Cisco ASA: denial of service via IKEv1
libvirt: two vulnerabilities
slirp4netns: use after free via ip_reass
OpenStack Keystone: privilege escalation via the EC2 API Signature TTL
Cisco ASA: denial of service via OSPF
Cisco ASA: memory leak via OSPF
Cisco ASA: information disclosure via HTTP GET
Jenkins Plugins: multiple vulnerabilities
Mozilla Firefox, Google Chrome: buffer overflow via SCTP
IBM WebSphere Application Server Liberty: privilege escalation via openidConnectServer
RoundCube Webmail: two vulnerabilities
Samba: three vulnerabilities
FreeBSD: denial of service via sendfile
LibVNCServer: buffer overflow
Recent vulnerabilities
Apache Guacamole: information disclosure via RDP Server
Google Android/Pixel: multiple vulnerabilities of July 2020
MobileIron Core/Sentry: three vulnerabilities
Xen: privilege escalation via Live EPT PTE
Xen: denial of service via VCPUOP_register_vcpu_info
Xen: privilege escalation via Cache Write-back Under VT-d
Xen: denial of service via X86 Dirty VRAM Tracking
Xen: denial of service via Event Channel Port Allocation
TYPO3 mm_forum: multiple vulnerabilities
TYPO3 Google reCAPTCHA: Cross Site Scripting
TYPO3 Turn: code execution via FTP/SFTP
TYPO3 typo3_forum: privilege escalation via Broken Access Control
TYPO3 Faceted Search: Cross Site Scripting
OpenEXR: buffer overflow via getChunkOffsetTableSize
OpenEXR: use after free via DeepScanLineInputFile
SUSE LE: privilege escalation via OPENLDAP_CONFIG_BACKEND
SUSE LE: privilege escalation via Pcp Permissions
NASM: out-of-bounds memory reading via parse_line
NASM: out-of-bounds memory reading via ieee_shr
NASM: out-of-bounds memory reading via tokenize
Severities: 1 = low, 2 = medium, 3 = important, 4 = critical.

Daily activities

  • Vulnerabilities are discovered daily and published on thousands of internet information sources.
  • Vigil@nce announces these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
  • Your teams secure and protect your networks based on Vigil@nce information and tools.

Your environment

  • A database describing more than 30000 vulnerabilities and their 70000 solutions.
  • A web space where each user defines his vigilance preferences.
  • Alert and synthesis e-mails, to inform your teams.
  • A customized tracking of your software and systems.
  • A diary to plan solutions to install, and to monitor the security process of each computer.

Your benefits

  • A customized watch on computer vulnerabilities and their solutions.
  • An experienced team at your service for more than 21 years.
  • A tool to monitor the security process of your networks and computers.
  • A CVE compatible solution.
  • A time saving for your team which concentrates on important tasks.