Since 1999, the Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security fixes, a database and tools to remediate them.
Each user customizes the list of software to track. As soon as Vigil@nce publishes an alert for one of his software, the user receives a vigilance bulletin, containing a simple explanation of the threat, its patches and workarounds.
The administrator then uses the online Vigil@nce diary in order to plan and track the security process.

Our offer Request your free trial

Computer vulnerabilities bulletins published by Vigil@nce

Public vulnerabilities
Linux kernel: memory corruption via sctp_destroy_sock
Ruby REXML: spoofing via XML Round-trip
inn: privilege escalation via innupgrade
JBoss Enterprise Application Platform: denial of service via /var/run/jboss-eap/ PID File Killing
ImageMagick: denial of service via division by zero Division By Zero
GNU Chess: buffer overflow via Portable Game Notation
Apache Batik: information disclosure via NodePickerPanel SSRF
QEMU: multiple vulnerabilities via am53c974 ESP Device Emulation
Linux kernel: NULL pointer dereference via llcp_sock_getname
McAfee Endpoint Security: information disclosure via Cleartext Transmission
Ubuntu: read-write access via overlayfs File System
Ubuntu: memory corruption via shiftfs File System
Kubernetes kube-apiserver: privilege escalation via Admission Webhook
WordPress Core: two vulnerabilities
FluidSynth: use after free via sfloader/fluid_sffile.c
PAN-OS: information disclosure via Scheduled Configuration Exports Logged Secrets
PAN-OS: information disclosure via XML API Logged Secrets
Ceph: privilege escalation via Global Identifier Reuse
NetworkManager: denial of service via Certain Profiles
Wind River VxWorks: buffer overflow via DHCP Client
Recent vulnerabilities
Libgcrypt: information disclosure via ElGamal
Go: denial of service via Net/http Large Header
Tor: three vulnerabilities
Python urllib: overload via URL Authority Parser
Jenkins Generic Webhook Trigger Plugin: external XML entity injection
Fortinet FortiClient: privilege escalation via Apple macOS
Chrome: four vulnerabilities
Sonatype Nexus Repository Manager: directory traversal via Blob Files
Symfony: data transit via Multiple Firewalls
Linux kernel: out-of-bounds memory reading via arm/mach-footbridge/personal-pci.c
tpm2-tools: Man-in-the-Middle via Fixed AES Key
Xstream: code execution via Input Stream Manipulation
RabbitMQ JMS Client: code execution via StreamMessage Deserialization
Nettle: denial of service via RSA Decryption
htmldoc: integer overflow via image_load_gif
Trend Micro InterScan Web Security Virtual Appliance: Cross Site Scripting via Captive Portal
BlueZ: integer overflow via cli_feat_read_cb
OTRS Help Desk: Cross Site Scripting via Ticket Overview
Firefox: out-of-bounds memory reading via Canvas Text Characters Drawing
Jenkins Scriptler Plugin: Cross Site Scripting
Severities: 1 = low, 2 = medium, 3 = important, 4 = critical.

Daily activities

  • Vulnerabilities are discovered daily and published on thousands of internet information sources.
  • Vigil@nce announces these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
  • Your teams secure and protect your networks based on Vigil@nce information and tools.

Your environment

  • A database describing more than 30000 vulnerabilities and their 70000 solutions.
  • A web space where each user defines his vigilance preferences.
  • Alert and synthesis e-mails, to inform your teams.
  • A customized tracking of your software and systems.
  • A diary to plan solutions to install, and to monitor the security process of each computer.

Your benefits

  • A customized watch on computer vulnerabilities and their solutions.
  • An experienced team at your service for more than 22 years.
  • A tool to monitor the security process of your networks and computers.
  • A CVE compatible solution.
  • A time saving for your team which concentrates on important tasks.