Since 1999, the Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security fixes, a database and tools to remediate them.
Each user customizes the list of software to track.
As soon as Vigil@nce publishes an alert for one of his software, the user receives a bulletin, containing a simple explanation of the threat, its patches and workarounds.
The administrator then uses the online Vigil@nce diary in order to plan and track the security process.


Our offer Free trial
Public vulnerabilities
2 IBM WebSphere Application Server: Cross Site Scripting via Admin Console
2 IBM WebSphere Application Server: directory traversal via Admin Console
2 kmplayer: buffer overflow
2 Dino XMPP: multiple vulnerabilities
2 Node.js gitlabhook: shell command injection
2 Notepad++: buffer overflow via Scintilla
2 Sphinx: information disclosure via missing authentication
2 Linux kernel: out-of-bounds memory reading via ath6kl_wmi_pstream_timeout_event_rx
2 Freeware Advanced Audio Coder: multiple vulnerabilities
2 Intel PROSet/Wireless WiFi Software: denial of service
1 Xen: denial of service via add-to-physmap
1 Xen: assertion error via VCPUOP_initialise
1 LibVNC: information disclosure via rfbSendServerCutText
1 Apport: information disclosure via Privileged Crash Dump
1 Apport: denial of service via Lock File Creation
1 Apport: information disclosure via Container Crash Dumps
1 Apport: information disclosure via Core Dump Creation
2 phpMyAdmin: Cross Site Request Forgery via the "servers" page
2 Linux kernel: out-of-bounds memory reading via hclge_tm_schd_mode_vnet_base_cfg
2 Linux kernel: out-of-bounds memory reading via drivers/scsi/qedi/qedi_dbg.c
Recent vulnerabilities
2 Node.js handlebars: code execution via Lookup Helper
2 Enigmail: information disclosure via SKS Keyserver Network Attack
2 X11 Mesa 3D Graphics: information disclosure via Shared Memory
2 FortiOS: information disclosure via Private Keys
2 Symantec Endpoint Protection: six vulnerabilities
2 FreeRADIUS: denial of service via Multithreaded BN_CTX Access
1 Linux kernel: NULL pointer dereference via btrfs_verify_dev_extents
2 OTRS Help Desk: infinite loop via Long Extensions Filenames
1 OTRS Help Desk: information disclosure via Ticket List
2 Kubernetes: information disclosure via Container Storage Interface
2 F5 BIG-IP ASM: information disclosure via JSON Websocket Request
1 F5 BIG-IP: information disclosure via Loggued Device Password
2 F5 BIG-IP: privilege escalation via Management Port Access
2 F5 BIG-IP: information disclosure via DNS Rebinding
2 F5 BIG-IP: information disclosure via restjavad
3 F5 BIG-IP APM: denial of service via apd/apmd
3 F5 BIG-IP: infinite loop via TMM HTTP Request
3 F5 BIG-IP: denial of service via TLS 1.3 Incoming Messages
2 Debian: privilege escalation via postgresql-common pg_ctlcluster Directory Creation
2 SUSE LE 15: privilege escalation via /usr/sbin/pinger
Severities: 1 = low, 2 = medium, 3 = important, 4 = critical.

Daily activities

  • Vulnerabilities are discovered daily and published on thousands of internet information sources.
  • Vigil@nce announces these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
  • Your teams secure and protect your networks based on Vigil@nce information and tools.

Your environment

  • A database describing more than 25000 vulnerabilities and their 60000 solutions.
  • A web space where each user defines his preferences.
  • Alert and synthesis e-mails, to inform your teams.
  • A customized tracking of your software and systems.
  • A diary to plan solutions to install, and to monitor the security process of each computer.

Your benefits

  • A customized watch on computer vulnerabilities and their solutions.
  • An experienced team at your service for more than 20 years.
  • A tool to monitor the security process of your networks and computers.
  • A CVE compatible solution.
  • A time saving for your team which concentrates on important tasks.