Since 1999, the Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security fixes, a database and tools to remediate them.
Each user customizes the list of software to track. As soon as Vigil@nce publishes an alert for one of his software, the user receives a vigilance bulletin, containing a simple explanation of the threat, its patches and workarounds.
The administrator then uses the online Vigil@nce diary in order to plan and track the security process.


Our offer Request your free trial

Computer vulnerabilities bulletins published by Vigil@nce

Public vulnerabilities
GNU LibreDWG: seven vulnerabilities
Microsoft Visual Studio: lack of TLS
Grafana: Cross Site Scripting via Column Link
OpenBSD: denial of service via UDP muticast
oVirt: Cross Site Scripting
Cryptacular: denial of service via CiphertextHeader Decode Operation
OpenSC: buffer overflow via CAC Certificates
OpenSC: use after free via sc_pkcs15_decode_prkdf_entry
Xfig: buffer overflow via read_colordef
ARC: directory traversal via Full Pathname
wpa: information disclosure via bad random in cryptography
Xen: information disclosure via a side channel
OpenBSD: denial of service via sysctl
bzip2: buffer overflow via BZ2_decompress
gd: information disclosure via gdImageCreateFromXbm
IBM MQ: denial of service via Invalid Message
IBM MQ: denial of service via Clustering Code
Node.js klona: code execution via Prototype Pollution
Node.js parsel: information disclosure via Hardcoded Initialization Vector
Node.js hapi/boom: Cross Site Scripting
Recent vulnerabilities
Node.js sapper: directory traversal
Node.js kind-of: privilege escalation
PyYAML: code execution via FullLoader/full_load
OTRS Help Desk: five vulnerabilities
F5 BIG-IP: denial of service via HTTP Profile
F5 BIG-IP: Man-in-the-Middle via HA Network Failover
F5 BIG-IP: denial of service via HTTP/3 QUIC
F5 BIG-IP: privilege escalation via TMOS Shell
F5 BIG-IP: denial of service via TMM Ram Cache
F5 BIG-IP: denial of service via AWS
BlueZ: privilege escalation via Subsystem Access Control
Linux kernel: out-of-bounds memory reading via wait_til_ready
Linux kernel: memory corruption via ashmem
pfSense: multiple vulnerabilities
Centreon: code execution via displayServiceStatus
Joomla AcyMailing: vulnerability
libxslt: denial of service via xsl-number
WebSphere AS: privilege escalation via SOAP Connector Token-based Authentication
Drupal Svg Image: Cross Site Scripting via SVG Files
Jenkins: multiple vulnerabilities
Severities: 1 = low, 2 = medium, 3 = important, 4 = critical.

Daily activities

  • Vulnerabilities are discovered daily and published on thousands of internet information sources.
  • Vigil@nce announces these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
  • Your teams secure and protect your networks based on Vigil@nce information and tools.

Your environment

  • A database describing more than 30000 vulnerabilities and their 70000 solutions.
  • A web space where each user defines his vigilance preferences.
  • Alert and synthesis e-mails, to inform your teams.
  • A customized tracking of your software and systems.
  • A diary to plan solutions to install, and to monitor the security process of each computer.

Your benefits

  • A customized watch on computer vulnerabilities and their solutions.
  • An experienced team at your service for more than 21 years.
  • A tool to monitor the security process of your networks and computers.
  • A CVE compatible solution.
  • A time saving for your team which concentrates on important tasks.