Since 1999, the Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security fixes, a database and tools to remediate them.
Each user customizes the list of software to track. As soon as Vigil@nce publishes an alert for one of his software, the user receives a vigilance bulletin, containing a simple explanation of the threat, its patches and workarounds.
The administrator then uses the online Vigil@nce diary in order to plan and track the security process.

Our offer Request your free trial

Computer vulnerabilities bulletins published by Vigil@nce

Public vulnerabilities
Apache Struts: code execution via Double OGNL Evaluation
WebSphere AS: code execution via Serialized Objects
Python Pygments: overload via SML File
File Roller: information disclosure
NetBSD: information disclosure via Predictable IP ID
newlib: integer overflow
Suricata: vulnerability
Pillow: three vulnerabilities
Pillow: five vulnerabilities
Chrome: multiple vulnerabilities
IBM SPSS Modeler: write access via Subscription Installer
IBM Spectrum Protect Plus Microsoft File Systems backup and restore: information disclosure via Log Files
Wireshark: code execution via Unsafe URLs
Python: information disclosure via pydoc
IBM DB2: denial of service via SSL Handshake Response
IBM DB2: buffer overflow via db2fm
libzmq: buffer overflow via ZMTP V1 Packets
libzmq: memory leak via Servers Without CURVE/ZAP
F5 BIG-IP APM: information disclosure via VPN Session ID
F5 BIG-IP: code execution via TMUI
Recent vulnerabilities
Drupal Chaos Tool Suite: information disclosure via EntityView
Drupal Facets: Cross Site Scripting
Drupal Gutenberg: denial of service via Blocks Deletion
VLC: code execution via non-https URL
Symfony: user account enumeration
SUSE LE 12: denial of service via xenstored.service
BlackBerry Unified Endpoint Manager: three vulnerabilities via Management Console
HCL Domino: privilege escalation
Check Point Quantum Smart-1: privilege escalation via iDRAC9
lz4: integer overflow via memmove
Linux kernel: memory corruption via CAN ISOTP
Linux kernel: use after free via llcp_sock_bind
Linux kernel: buffer overflow via MAX_RW_COUNT
Linux kernel: integer overflow via eBPF
Linux kernel: buffer overflow via eBPF
Dell EMC Connectrix B-Series: multiple vulnerabilities via SANnav
PHPMailer: code execution via Object Injection
rails: two vulnerabilities
Wi-Fi Devices: multiple vulnerabilities via FragAttacks
Django: data transit via URLValidator
Severities: 1 = low, 2 = medium, 3 = important, 4 = critical.

Daily activities

  • Vulnerabilities are discovered daily and published on thousands of internet information sources.
  • Vigil@nce announces these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
  • Your teams secure and protect your networks based on Vigil@nce information and tools.

Your environment

  • A database describing more than 30000 vulnerabilities and their 70000 solutions.
  • A web space where each user defines his vigilance preferences.
  • Alert and synthesis e-mails, to inform your teams.
  • A customized tracking of your software and systems.
  • A diary to plan solutions to install, and to monitor the security process of each computer.

Your benefits

  • A customized watch on computer vulnerabilities and their solutions.
  • An experienced team at your service for more than 22 years.
  • A tool to monitor the security process of your networks and computers.
  • A CVE compatible solution.
  • A time saving for your team which concentrates on important tasks.