Since 1999, the Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security fixes, a database and tools to remediate them.
Each user customizes the list of software to track. As soon as Vigil@nce publishes an alert for one of his software, the user receives a vigilance bulletin, containing a simple explanation of the threat, its patches and workarounds.
The administrator then uses the online Vigil@nce diary in order to plan and track the security process.

Our offer Request your free trial

Computer vulnerabilities bulletins published by Vigil@nce

Public vulnerabilities
Cisco Nexus: denial of service via SXP
Cisco IOS / IOS XE: denial of service via SNMP
Cisco IOS / IOS XE: denial of service via SIP
Cisco Prime Infrastructure: SQL injection
Cisco IOS: privilege escalation via Cisco Industrial Routers Image Verification Bypass
Cisco IOS: privilege escalation via Cisco Industrial Routers Virtual Device Server
Cisco IOS: code execution via Cisco Industrial Routers Virtual Device Server
Cisco IOS XE: denial of service via Catalyst 9800 Series Wireless Controllers
Cisco IOS / IOS XE: denial of service via CIP
Cisco IOS: privilege escalation via Catalyst 2960-L / CDB-8P
Cisco IOS XE: privilege escalation via SD-WAN Software
Cisco ASR 920: denial of service via SNMP
Drupal Services: privilege escalation via Taxonomy Term
OpenStack Cinder: information disclosure via Dell EMC ScaleIO/VxFlex OS Backend
Grafana: information disclosure via Avatar HTTP Scan
Jenkins Plugins: multiple vulnerabilities
Django: two vulnerabilities
Symfony: privilege escalation via AbstractToken-hasUserChanged
Grafana: Cross Site Scripting via Dashboard Settings
Grafana: Cross Site Scripting via Table Panel Set Column Styles
Recent vulnerabilities
WebKitGTK: multiple vulnerabilities
Cacti: Cross Site Scripting via Template Import Preview
Bluetooth: privilege escalation via BR/EDR Impersonation Attack
Linux kernel: use after free via chrdev_open
X.Org Xserver: information disclosure via AllocatePixmap
libX11: integer overflow via XIM Client
Claws Mail: information disclosure via STARTTLS Protocol Violation
Ark: directory traversal
GNOME evolution-data-server: NULL pointer dereference via imapx_free_capability
libssh: NULL pointer dereference via ssh_buffer_new
libjpeg: overload via jpeg_mem_available
HPE ProLiant: code execution via GRUB2 Insmod
Linux kernel: information disclosure via random32
Ghostscript: read-write access via Post Rsearch
FreeRDP: integer overflow via Rdpegfx Channel
WebSphere AS: privilege escalation via UNC Paths
KDE KMail: information disclosure via Unencrypted POP3 Communication
Debian: privilege escalation via NET-SNMP-EXTEND-MIB
Node.js elliptic: information disclosure via ECDSA Signature Malleability
Node.js auth0: information disclosure via Authorization Header
Severities: 1 = low, 2 = medium, 3 = important, 4 = critical.

Daily activities

  • Vulnerabilities are discovered daily and published on thousands of internet information sources.
  • Vigil@nce announces these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
  • Your teams secure and protect your networks based on Vigil@nce information and tools.

Your environment

  • A database describing more than 30000 vulnerabilities and their 70000 solutions.
  • A web space where each user defines his vigilance preferences.
  • Alert and synthesis e-mails, to inform your teams.
  • A customized tracking of your software and systems.
  • A diary to plan solutions to install, and to monitor the security process of each computer.

Your benefits

  • A customized watch on computer vulnerabilities and their solutions.
  • An experienced team at your service for more than 21 years.
  • A tool to monitor the security process of your networks and computers.
  • A CVE compatible solution.
  • A time saving for your team which concentrates on important tasks.