Since 1999, the Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security fixes, a database and tools to remediate them.
Each user customizes the list of software to track. As soon as Vigil@nce publishes an alert for one of his software, the user receives a vigilance bulletin, containing a simple explanation of the threat, its patches and workarounds.
The administrator then uses the online Vigil@nce diary in order to plan and track the security process.


Our offer Request your free trial

Computer vulnerabilities bulletins published by Vigil@nce

Public vulnerabilities
Palo Alto PAN-OS: information disclosure via Logged Passwords
Palo Alto PAN-OS: information disclosure via Logged Passwords
Palo Alto PAN-OS: privilege escalation via Management Web Interface
Palo Alto PAN-OS: code execution via OS Command Injection
Palo Alto PAN-OS: code execution via OS Command Injection
SUSE: privilege escalation via avahi
OpenSSL: information disclosure via DH Pre-master Secret Raccoon
Wind River VxWorks: directory traversal via WebCLI
Apache mod_authnz_pam: information disclosure via Cached Passwords
PoDoFo: buffer overflow via W_MAX_BYTES
FreeRDP: five vulnerabilities
FreeRDP: three vulnerabilities
Perl YAML-LibYAML: privilege escalation via Unset Load Blessed
Wildfly: denial of service via EJB SessionOpenInvocations
Wildfly: denial of service via Accumulated EJB Transaction Objects
Node.js bl: information disclosure
Linux kernel: denial of service via xfs_attr_shortform_verify
FFmpeg: out-of-bounds memory reading via block_cmp
Drupal Modal Form: information disclosure
Drupal Apigee Edge: information disclosure via Add Team Member
Recent vulnerabilities
Fortinet Fortigate: Man-in-the-Middle via Valid SSL-VPN Certificate
Cisco Aironet Access Point: overload via Authentication Flood
Fortinet FortiOS: buffer overflow via SSL VPN
Cisco Catalyst 9200: denial of service via Polaris Kernel Jumbo Frame
Fortinet FortiOS: buffer overflow via LCP
Apple macOS: four vulnerabilities
Cisco IOS: information disclosure via LPWA
Cisco Aironet: denial of service via Ethernet
Cisco Aironet: denial of service via UDP
Linux kernel: buffer overflow via f2fs_truncate_inline_inode
Cisco IOS, IOS XE: multiple vulnerabilities
F5 BIG-IP: information disclosure via HTTP
F5 BIG-IP: denial of service via TMM
F5 BIG-IP: information disclosure via SSL/TLS ADH/DHE
rails: four vulnerabilities
PackageKit: two vulnerabilities
Aptdaemon: information disclosure via Locale
Contao: Cross Site Scripting
Podman: privilege escalation via mounting
Check Point ZoneAlarm Anti-Ransomware: privilege escalation
Severities: 1 = low, 2 = medium, 3 = important, 4 = critical.

Daily activities

  • Vulnerabilities are discovered daily and published on thousands of internet information sources.
  • Vigil@nce announces these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
  • Your teams secure and protect your networks based on Vigil@nce information and tools.

Your environment

  • A database describing more than 30000 vulnerabilities and their 70000 solutions.
  • A web space where each user defines his vigilance preferences.
  • Alert and synthesis e-mails, to inform your teams.
  • A customized tracking of your software and systems.
  • A diary to plan solutions to install, and to monitor the security process of each computer.

Your benefits

  • A customized watch on computer vulnerabilities and their solutions.
  • An experienced team at your service for more than 21 years.
  • A tool to monitor the security process of your networks and computers.
  • A CVE compatible solution.
  • A time saving for your team which concentrates on important tasks.