Since 1999, the Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security fixes, a database and tools to remediate them.
Each user customizes the list of software to track. As soon as Vigil@nce publishes an alert for one of his software, the user receives a vigilance bulletin, containing a simple explanation of the threat, its patches and workarounds.
The administrator then uses the online Vigil@nce diary in order to plan and track the security process.

Our offer Request your free trial

Computer vulnerabilities bulletins published by Vigil@nce

Public vulnerabilities
Windows: privilege escalation via splWOW64
Veritas Enterprise Vault, NetBackup: privilege escalation via openssl.cnf / Strawberry Perl
Centreon Web: multiple vulnerabilities
Node.js parse-server: privilege escalation via Plain Text Password
Node.js date-and-time: denial of service via Regular Expression
RoundCube: Cross Site Scripting via Message Content
FasterXML Jackson Databind: code execution via JNDIConnectionPool
ArcGIS Server: information disclosure via Server Side Request Forgery
MariaDB: privilege escalation via Named Pipe
Joomla RealPin by Frumania: SQL injection
McAfee Network Security Manager: Cross Site Request Forgery
OpenEXR: buffer overflow via chunkOffsetReconstruction
HCL Domino: denial of service via Public API
FLAC: out-of-bounds memory reading via FLAC__bitreader_read_rice_signed_block
C-Blosc2: buffer overflow via Compressed Data Limit
Joomla JomSocial: Cross Site Scripting
libbfd: use after free via bfd_hash_lookup
Webmin: code execution via handle_request
QEMU: out-of-bounds memory reading via iscsi_aio_ioctl_cb
QEMU: out-of-bounds memory reading via ati_cursor_define
Recent vulnerabilities
SaltStack: multiple vulnerabilities
QEMU: denial of service via NIC Loopback Mode
Node.js querystringify: read-write access via Prototype Override
Node.js nwmatcher: denial of service via Regular Expression
Microsoft System Center 2019 Operations Manager: privilege escalation
libcni: code execution via CNI Configuration Type Field
libmysofa: five vulnerabilities
PySAML2: Man-in-the-Middle via CryptoBackendXmlSec1
glibc: assertion error via iconv ISO-2022-JP-3
LibTIFF: buffer overflow via t2p_read_tiff_size
LibTIFF: buffer overflow via gtTileContig
Python Jinja: overload via Regular Expression
ImageMagick: denial of service via WriteJP2Image
ImageMagick: denial of service via ScaleResampleFilter
ImageMagick: denial of service via ImplodeImage
ImageMagick: denial of service via GetResizeFilterWeight
Node.js esm: denial of service via Regular Expression
Node.js diff: overload via Regular Expression
Node.js angular: Cross Site Scripting via JSONP
QEMU: overload via e1000
Severities: 1 = low, 2 = medium, 3 = important, 4 = critical.

Daily activities

  • Vulnerabilities are discovered daily and published on thousands of internet information sources.
  • Vigil@nce announces these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
  • Your teams secure and protect your networks based on Vigil@nce information and tools.

Your environment

  • A database describing more than 30000 vulnerabilities and their 70000 solutions.
  • A web space where each user defines his vigilance preferences.
  • Alert and synthesis e-mails, to inform your teams.
  • A customized tracking of your software and systems.
  • A diary to plan solutions to install, and to monitor the security process of each computer.

Your benefits

  • A customized watch on computer vulnerabilities and their solutions.
  • An experienced team at your service for more than 22 years.
  • A tool to monitor the security process of your networks and computers.
  • A CVE compatible solution.
  • A time saving for your team which concentrates on important tasks.