Since 1999, the Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security fixes, a database and tools to remediate them.
Each user customizes the list of software to track. As soon as Vigil@nce publishes an alert for one of his software, the user receives a vigilance bulletin, containing a simple explanation of the threat, its patches and workarounds.
The administrator then uses the online Vigil@nce diary in order to plan and track the security process.


Our offer Request your free trial

Computer vulnerabilities bulletins published by Vigil@nce

Public vulnerabilities
Linux kernel: denial of service via usbip_sockfd_store
Linux kernel: denial of service via gianfar.c
Adminer: information disclosure via Error Page SSRF
Jasper: out-of-bounds memory reading via jp2_decode
Python Cryptography: integer overflow via Multi-GB Values Symmetrically Encryption
McAfee Endpoint Security: five vulnerabilities
PostgreSQL: information disclosure via Single-column SELECT Privilege
PostgreSQL: information disclosure via Partition Constraint
GNOME gnome-autoar: directory traversal via autoar-extractor.c
Netty: information disclosure via Temporary File
F5 BIG-IP: privilege escalation via IControl REST Race Condition
F5 BIG-IP AFM: Cross Site Scripting via Configuration Utility
F5 BIG-IP APM: overload via VPN Traffic
F5 BIG-IP DNS/GTM: buffer overflow via Big3d Agent
F5 BIG-IP ASM: data transit via Cookies Signature Checks
F5 BIG-IP: denial of service via HTTP Session
F5 BIG-IP APM: executing DLL code via Client Troubleshooting Utility
F5 BIG-IP: Man-in-the-Middle via TLS Master Secret Negotiation
F5 BIG-IP ASM: overload via WebSocket JSON Payloads
F5 BIG-IP: Cross Site Scripting via iControl REST
Recent vulnerabilities
Windows: vulnerabilities of April 2021
Microsoft Visual Studio: vulnerabilities of April 2021
Microsoft SharePoint: vulnerabilities of April 2021
Microsoft Exchange Server: vulnerabilities of April 2021
Microsoft 365 Apps for Enterprise: vulnerabilities of April 2021
Microsoft Office: vulnerabilities of April 2021
Joomla Core: two vulnerabilities
cifs-utils: privilege escalation via Kerberos Auth Leak Escaping
X.Org Server: buffer overflow via XInput Extension ChangeFeedbackControl
Mosquitto: Man-in-the-Middle
Node.js mongodb-client-encryption: Man-in-the-Middle via Improper Certificate Validation
Node.js set-or-get: read-write access via Prototype Pollution
SAP: multiple vulnerabilities of April 2021
Irssi: multiple vulnerabilities
Dell OpenManage Enterprise-Modular: privilege escalation
libpano13: use after free via panoFileOutputNamesCreate
Linux kernel: out-of-bounds memory reading via x25_bind
MediaWiki: multiple vulnerabilities
libopenmpt: NULL pointer dereference via set_position_seconds
Python Pikepdf: external XML entity injection via XMP Metadata Entries
Severities: 1 = low, 2 = medium, 3 = important, 4 = critical.

Daily activities

  • Vulnerabilities are discovered daily and published on thousands of internet information sources.
  • Vigil@nce announces these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
  • Your teams secure and protect your networks based on Vigil@nce information and tools.

Your environment

  • A database describing more than 30000 vulnerabilities and their 70000 solutions.
  • A web space where each user defines his vigilance preferences.
  • Alert and synthesis e-mails, to inform your teams.
  • A customized tracking of your software and systems.
  • A diary to plan solutions to install, and to monitor the security process of each computer.

Your benefits

  • A customized watch on computer vulnerabilities and their solutions.
  • An experienced team at your service for more than 22 years.
  • A tool to monitor the security process of your networks and computers.
  • A CVE compatible solution.
  • A time saving for your team which concentrates on important tasks.