Since 1999, the Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security fixes, a database and tools to remediate them.
Each user customizes the list of software to track. As soon as Vigil@nce publishes an alert for one of his software, the user receives a vigilance bulletin, containing a simple explanation of the threat, its patches and workarounds.
The administrator then uses the online Vigil@nce diary in order to plan and track the security process.


Our offer Request your free trial

Computer vulnerabilities bulletins published by Vigil@nce

Public vulnerabilities
QEMU: memory corruption via USB Emulator
VMware ESXi, VMware vCenter Server: denial of service via Authentication Services
Squid cache: information disclosure via HTTP Request Smuggling
Squid cache: overload via Cache Digest Response
Squid cache: information disclosure via HTTP Request Splitting
Node.js next: open redirect
Chrony: privilege escalation via PID File
Icinga Web2: directory traversal
PHP: multiple vulnerabilities
Linux kernel: out-of-bounds memory reading via ppp_cp_parse_cr
Nessus: privilege escalation via Unexpired Sessions
GhostScript: buffer overflow via GetNumSameData
OpenBSD: denial of service via PROT_NONE MAP_SHARED
ISC BIND: privilege escalation via Update-policy Rules
Linux kernel: privilege escalation via Secure Boot Forbidden Signature Bypass
Node.js auth0-lock: Cross Site Scripting
Linux kernel: read-write access via Nfsd No-ACL Unapplied Umask
Micro Focus ArcSight Management Center: denial of service
swtpm: code execution via External Tools Eval
QEMU: integer overflow via oss_write
Recent vulnerabilities
Elasticsearch: information disclosure via Document/Field Level Security
Eclipse Jetty: privilege escalation via Temporary Directory Race
Cisco ASA Software: denial of service via SSL/TLS Handler
Apache mod_auth_mellon: information disclosure via Cross-Site Session Transfer
Cisco ASA Software: Cross Site Scripting via Web Services
Cisco ASA Software: denial of service via HTTP Requests
Cisco ASA Software: denial of service via SSL VPN Direct Memory Access
Cisco ASA Software: denial of service via SIP
Cisco ASA Software: privilege escalation via WebVPN Portal Access Rule Bypass
Cisco ASA Software: denial of service via OSPFv2 Link-Local Signaling
Cisco ASA Software: read-write access via FTP Inspection Engine Bypass
Cisco ASA Software: memory leak via IP Fragment
Cisco ASA Software: denial of service via File Upload
Cisco ASA Software: memory leak via TCP Packet
Cisco ASA Software: Cross Site Scripting via Web-Based Management Interface
Cisco ASA Software: denial of service via SSL/TLS Session
Cisco ASA Software: read-write access via WebVPN HTTP Headers Injection
Cisco ASA Software: privilege escalation via Firepower 1000/2100 Secure Boot Bypass
Cisco Meraki MX: privilege escalation via Snort HTTP Detection Bypass
eZ Publish: read-write access via Legacy Shop Module
Severities: 1 = low, 2 = medium, 3 = important, 4 = critical.

Daily activities

  • Vulnerabilities are discovered daily and published on thousands of internet information sources.
  • Vigil@nce announces these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
  • Your teams secure and protect your networks based on Vigil@nce information and tools.

Your environment

  • A database describing more than 30000 vulnerabilities and their 70000 solutions.
  • A web space where each user defines his vigilance preferences.
  • Alert and synthesis e-mails, to inform your teams.
  • A customized tracking of your software and systems.
  • A diary to plan solutions to install, and to monitor the security process of each computer.

Your benefits

  • A customized watch on computer vulnerabilities and their solutions.
  • An experienced team at your service for more than 21 years.
  • A tool to monitor the security process of your networks and computers.
  • A CVE compatible solution.
  • A time saving for your team which concentrates on important tasks.