Since 1999, the Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security fixes, a database and tools to remediate them.
Each user customizes the list of software to track. As soon as Vigil@nce publishes an alert for one of his software, the user receives a vigilance bulletin, containing a simple explanation of the threat, its patches and workarounds.
The administrator then uses the online Vigil@nce diary in order to plan and track the security process.

Our offer Request your free trial

Computer vulnerabilities bulletins published by Vigil@nce

Public vulnerabilities
Ubuntu: information disclosure via linux-image-4.15.0
Podman: file corruption via Container Image
Node.js cordova-plugin-inappbrowser: privilege escalation via gap-iab URI
FreeBSD: privilege escalation via grub2-bhyve Font Loading
Python: denial of service via urllib.request.AbstractBasicAuthHandler
Sudo: privilege escalation via pwfeedback
WebSphere AS: memory leak
Pillow: buffer overflow via libImaging/SgiRleDecode.c
Pillow: integer overflow via libImaging/TiffDecode.c
rmt-server: denial of service via Offline Migration
SUSE wicked: memory leak via DHCP4 Missing Message Type
SUSE wicked: use after free via DHCP6 Client Options
Apache CouchDB: privilege escalation via HTTPS Database Server
libsolv: denial of service via repodata_schema2id
Apache CouchDB: read-write access via Runtime Configuration
Apache CouchDB: privilege escalation via HTTPS Database Server
Suricata: privilege escalation via TCP FIN Overlapping Signature Bypass
Suricata: privilege escalation via TCP Timestamp Signature Bypass
OSSEC HIDS: multiple vulnerabilities
Jenkins Plugins: three vulnerabilities
Recent vulnerabilities
Coturn TURN Server: two vulnerabilities
WebSphere AS Liberty: Cross Site Scripting
pam-krb5: buffer overflow via Initiated Prompting
Tinyproxy: denial of service via Kill
Symfony: information disclosure via ErrorHandler
Symfony: privilege escalation via Firewall accessDecisionManager
Symfony: spoofing via Content-Type Cache Poisoning
Linux kernel: memory corruption via BPF JMP32 Instructions
Timeshift: file corruption via /tmp/timeshift
GraphicsMagick: buffer overflow via HuffmanDecodeImage
Stormshield Network Security: four vulnerabilities of SMC
Apache Tika: overload via PSD File
Tor: memory leak via circpad_setup_machine_on_circ
ModSecurity: overload via Transaction-addRequestHeader
dcraw: buffer overflow via find_green
Node.js sapper: directory traversal
Node.js kind-of: privilege escalation
PyYAML: code execution via FullLoader/full_load
OTRS Help Desk: five vulnerabilities
F5 BIG-IP: denial of service via HTTP Profile
Severities: 1 = low, 2 = medium, 3 = important, 4 = critical.

Daily activities

  • Vulnerabilities are discovered daily and published on thousands of internet information sources.
  • Vigil@nce announces these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
  • Your teams secure and protect your networks based on Vigil@nce information and tools.

Your environment

  • A database describing more than 30000 vulnerabilities and their 70000 solutions.
  • A web space where each user defines his vigilance preferences.
  • Alert and synthesis e-mails, to inform your teams.
  • A customized tracking of your software and systems.
  • A diary to plan solutions to install, and to monitor the security process of each computer.

Your benefits

  • A customized watch on computer vulnerabilities and their solutions.
  • An experienced team at your service for more than 21 years.
  • A tool to monitor the security process of your networks and computers.
  • A CVE compatible solution.
  • A time saving for your team which concentrates on important tasks.