Since 1999, the Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security fixes, a database and tools to remediate them.
Each user customizes the list of software to track.
As soon as Vigil@nce publishes an alert for one of his software, the user receives a bulletin, containing a simple explanation of the threat, its patches and workarounds.
The administrator then uses the online Vigil@nce diary in order to plan and track the security process.


Our offer Free trial
Public vulnerabilities
1 Linux kernel: information disclosure via __btrfs_free_extent
1 Linux kernel: NULL pointer dereference via ext4_empty_dir
1 Linux kernel: NULL pointer dereference via btrfs_root_node
1 Linux kernel: multiple vulnerabilities via Memory Leak
1 Linux kernel: five vulnerabilities via Memory Leak
1 Linux kernel: memory leak via unittest_data_add
1 Linux kernel: five vulnerabilities via Memory Leak
1 Linux kernel: three vulnerabilities via Memory Leak
1 Linux kernel: memory leak via nfp_abm_u32_knode_replace
1 Linux kernel: two vulnerabilities via Memory Leak
1 Linux kernel: memory leak via qrtr_tun_write_iter
2 Dell EMC Avamar Server: read-write access via Incorrect Permission
2 ECDSA/EdDSA: information disclosure via Side-channel Key Recovery
2 OTRS: Cross Site Scripting
2 OpenBSD: information disclosure via dhcpd
2 Unbound: denial of service via NOTIFY
2 IBM QRadar SIEM: denial of service
2 Node.js realms-shim: privilege escalation via Sandbox Breakout
2 libapreq2: NULL pointer dereference
2 Cisco Prime Infrastructure: Cross Site Scripting
Recent vulnerabilities
2 phpMyAdmin: Cross Site Scripting via Git Version Information
1 Linux kernel: denial of service via fpregs_state_valid
1 SQLite: denial of service via LookupName ColUsed Bitmask
3 VMware ESXi: buffer overflow via OpenSLP
2 Munge: privilege escalation
1 OpenCV: denial of service via cv-HOGDescriptor-getDescriptorSize
2 OpenCV: out-of-bounds memory reading via HaarEvaluator-OptFeature-calc
2 OpenCV: out-of-bounds memory reading via cv-predictOrdered
1 Libav: denial of service via range_decode_culshift
2 Libav: out-of-bounds memory reading via decode_frame
2 Libav: out-of-bounds memory reading via mpc8_probe
1 Libav: NULL pointer dereference via vc1_decode_frame
2 RabbitMQ C Client: integer overflow via amqp_handle_input
2 Palo Alto PAN-OS: privilege escalation via Low Privileged Custom-role User
2 SUSE LE: privilege escalation via Symbolic Links
2 Dnsmasq: memory leak via DHCP Response Creation
2 FFmpeg: buffer overflow via vqa_decode_chunk
1 FFmpeg: NULL pointer dereference via ff_mpeg4_decode_picture_header
2 Wireshark: denial of service via CMS
2 Cyrus IMAP: privilege escalation via HTTP Request Authentication Context
Severities: 1 = low, 2 = medium, 3 = important, 4 = critical.

Daily activities

  • Vulnerabilities are discovered daily and published on thousands of internet information sources.
  • Vigil@nce announces these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
  • Your teams secure and protect your networks based on Vigil@nce information and tools.

Your environment

  • A database describing more than 25000 vulnerabilities and their 60000 solutions.
  • A web space where each user defines his preferences.
  • Alert and synthesis e-mails, to inform your teams.
  • A customized tracking of your software and systems.
  • A diary to plan solutions to install, and to monitor the security process of each computer.

Your benefits

  • A customized watch on computer vulnerabilities and their solutions.
  • An experienced team at your service for more than 20 years.
  • A tool to monitor the security process of your networks and computers.
  • A CVE compatible solution.
  • A time saving for your team which concentrates on important tasks.