<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en" xmlns:og="http://ogp.me/ns#">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<meta http-equiv="Content-Script-Type" content="text/javascript">
<meta http-equiv="Content-Style-Type" content="text/css">
<meta http-equiv="Content-Language" content="en">
<link rel="alternate" hreflang="en" href="https://vigilance.fr/?langue=2"/>
<link rel="alternate" hreflang="fr" href="https://vigilance.fr/?langue=1"/>
<link rel="canonical" href="https://vigilance.fr/?langue=2"/>
<meta property="og:url" content="https://vigilance.fr/?langue=2" />
<title>Vigilance Computer Vulnerability Alerts</title>
<style type="text/css">
<!--
@font-face {
font-family: OrangeHelvNeue55;
src:url("https://vigilance.fr/images/orange_police/EOT/HelvNeue55_W1G.eot?#iefix");
src:url("https://vigilance.fr/images/orange_police/EOT/HelvNeue55_W1G.eot?#iefix") format("eot"),
url("https://vigilance.fr/images/orange_police/WOFF2/HelvNeue55_W1G.woff2") format("woff2"),
url("https://vigilance.fr/images/orange_police/WOFF/HelvNeue55_W1G.woff") format("woff"),
url("https://vigilance.fr/images/orange_police/TTF/HelvNeue55_W1G.ttf") format("truetype"),
url("https://vigilance.fr/images/orange_police/SVG/HelvNeue55_W1G.svg") format("svg");
font-weight: normal;
font-style: normal;
font-display: swap;
}
body {font-family: OrangeHelvNeue55, Arial, Helvetica, sans-serif; text-align: justify; font-size: 11pt;}
table {font-family: OrangeHelvNeue55, Arial, Helvetica, sans-serif; text-align: justify; font-size: 11pt;}
form input.stylebouton {font-family: OrangeHelvNeue55, Arial, Helvetica, sans-serif; text-align: justify; font-size: 11pt;}
ul {margin-top: 0; margin-bottom: 0;}
ul.pucecarre {list-style-image:url("https://vigilance.fr/images/orange_puce/carre.gif"); line-height: 1.4em;}
ul.pucecheck {list-style-image:url("https://vigilance.fr/images/orange_puce/check.png"); line-height: 1.4em;}
ul.pucechevron {list-style-image:url("https://vigilance.fr/images/orange_puce/chevron.gif"); line-height: 1.4em;}
ul.pucefleche {list-style-image:url("https://vigilance.fr/images/orange_puce/fleche.gif"); line-height: 1.4em;}
a.noirorange {text-decoration:none;}
a.noirorange:link {color: #000000;}
a.noirorange:visited {color: #000000;}
a.noirorange:hover {color: #F16E00;}
a.blancorange {text-decoration:none;}
a.blancorange:link {color: #FFFFFF;}
a.blancorange:visited {color: #FFFFFF;}
a.blancorange:hover {color: #FF7900;}
-->
</style>
<meta http-equiv="keywords" content="alerts, computer, service, solutions, vigilance, vulnerabilities, vulnerability, watch">
<meta name="keywords" content="alerts, computer, service, solutions, vigilance, vulnerabilities, vulnerability, watch">
<meta name="description" content="Vigilance Computer Vulnerability Alerts is a watch service on computer vulnerabilities and their solutions.">
<link rel="shortcut icon" href="https://vigilance.fr/images/favicon/favicon.ico" />
<link rel="icon" sizes="32x32" href="https://vigilance.fr/images/favicon/favicon-32.png" type="image/png" />
<link rel="icon" sizes="48x48" href="https://vigilance.fr/images/favicon/favicon-48.png" type="image/png" />
<link rel="icon" sizes="144x144" href="https://vigilance.fr/images/favicon/favicon-144.png" type="image/png" />
<link rel="icon" sizes="256x256" href="https://vigilance.fr/images/favicon/favicon-256.png" type="image/png" />
<meta name="author" content="Vigilance Alertes Vulnérabilités"/>
<meta property="og:type" content="website" />
<meta property="og:title" content="Vigilance Computer Vulnerability Alerts" />
<meta property="og:description" content="Vigilance Computer Vulnerability Alerts is a watch service on computer vulnerabilities and their solutions." />
<meta property="og:image" content="https://vigilance.fr/images/opengraph/vigilance_en.png" />
<meta property="og:image:type" content="image/png" />
<meta property="og:locale" content="en_US" />
<meta property="og:site_name" content="Vigilance Alertes Vulnérabilités" />
<meta name="twitter:site" content="@vigilance_en" />
<meta name="twitter:creator" content="@vigilance_en" />
<meta name="twitter:card" content="summary_large_image" />
<meta name="viewport" content="width=device-width" />
<script type="application/ld+json">
{
"@context" : "https://schema.org",
"@type" : "WebSite",
"name" : "Vigilance Alertes Vulnérabilités",
"alternateName" : ["Vigilance Vulnérabilités", "Vigilance Orange", "Vigilance.fr"],
"url" : "https://vigilance.fr/",
"headline" : "Vigilance Computer Vulnerability Alerts",
"author" : {
"@type" : "Organization",
"name" : "Vigilance Alertes Vulnérabilités",
"alternateName" : ["Vigilance Vulnérabilités", "Vigilance Orange", "Vigilance.fr"],
"url" : "https://vigilance.fr/"
}
}
</script>
<link rel="alternate" type="application/rss+xml" title="Vigilance.fr - public vulnerabilities" href="https://vigilance.fr/rsspublic?langue=2">
<style type="text/css">
<!--
/* Générique */
body {
margin: 0 0 0 0;
background-color: #FFFFFF;
padding-left: 0; padding-right: 0;
padding-top: 132px;
padding-bottom: 1.3em;
}
div#bandeauhaut {
position: absolute;
left: 0; top: 0;
width: 100%;
height: 132px;
background-color: #000000;
}
div#bandeauscrollable {
padding-left: 0; padding-right: 0;
}
div#bandeaubas {
position: absolute;
left: 0; bottom: 0;
width: 100%;
height: 1.2em;
background-color: #ffffff;
}
/* Mozilla, Firefox, Internet Explorer 7 */
@media screen {
body>div#bandeauhaut {
position: fixed;
}
body>div#bandeaubas {
position: fixed;
}
}
/* Internet Explorer 6 */
* html body {
overflow: hidden;
}
* html div#bandeauscrollable {
overflow: auto;
height: 100%;
}
-->
</style>
<!--[if IE]>
<STYLE TYPE="text/css">
form input.stylebouton {
padding: 0 .25em;
width: 0;
overflow: visible;
vertical-align: ;
}
</STYLE>
<![endif]-->
<!--[if !IE]>-->
<style type="text/css">
<!--
.stylebouton {
background-color: #000000;
color: #FFFFFF;
border: none;
padding: 5px;
margin: 1px;
font-weight: bold;
}
-->
</style>
<!--<![endif]-->
</head>
<!-- step1:1768085495 -->
<body bgcolor="#FFFFFF"><div id="bandeauhaut"><nav><table summary="" cellspacing="0" cellpadding="0" border="0">
<tr width="100%">
<td bgcolor="#000000" width="25"><img src="https://vigilance.fr/images/1x1.gif" alt="" width="25" height="100" border="0"/></td>
<td bgcolor="#000000" width="139"><a href="https://vigilance.fr/?langue=2"><img src="https://vigilance.fr/images/logo/ob.png" border="0" width="232" height="50" alt="Orange Business" title="Orange Business"></a></td>
<td bgcolor="#000000" width="25"><img src="https://vigilance.fr/images/1x1.gif" alt="" width="25" height="100" border="0"/></td>
<td bgcolor="#000000" width="100%" align="center"><a href="https://vigilance.fr/?langue=2"><img src="https://vigilance.fr/images/logo/vigilance_en.png" border="0" width="198" height="66" alt="Vigilance Computer Vulnerability Alerts" title="Vigilance Computer Vulnerability Alerts"></a></td>
<td bgcolor="#000000" align="right"><form name="lc_form_1" action="https://vigilance.fr/?gentime=1768085495" method="POST" accept-charset="UTF-8"><input type="HIDDEN" name="origine" id="mpa_origine" value="1422249506"><input type="HIDDEN" name="langue" id="mpa_langue" value="2"><table summary="" cellspacing="0" cellpadding="0" border="0">
<tr><td><input type="TEXT" name="texte" id="mpa_texte" value="" size="8" title="Pattern to find in vulnerabilities"></td>
<td><input type="IMAGE" name="rechtexte" id="mpa_rechtexte" src="https://vigilance.fr/images/icone45x36/loupe.png" alt="Find" title="Find" onclick="JavaScript:if (document.lc_form_1.texte.value == false) {alert('Pattern to find in vulnerabilities is compulsory.'); return(false);} return(true);"><script type="text/javascript" language="JavaScript">
<!--
function lc_cliqueboutonimage(ref) {if ((typeof(document.getElementById)!="undefined")) {document.getElementById(ref).click();}}// -->
</script><input type="HIDDEN" name="form_premier_bouton" id="mpa_form_premier_bouton" value="rechtexte"></td>
<td><a href="https://vigilance.fr/?langue=1"><img src="https://vigilance.fr/images/icone45x36/langue_fr.gif" border="0" width="45" height="36" alt="Version française" title="Version française"></a></td>
<td></td>
<td><a href="https://vigilance.fr/subscriber"><img src="https://vigilance.fr/images/icone45x36/abonne.png" border="0" width="45" height="36" alt="Subscriber area" title="Subscriber area"></a></td>
</tr>
</table></form></td>
</tr>
<tr width="100%">
<td bgcolor="#000000" width="25"></td>
<td bgcolor="#000000" colspan="3"><table summary="" cellspacing="0" cellpadding="0" border="0"><tr><td align="center"><b><a href="https://vigilance.fr/?langue=2" style="color: #FF7900; text-decoration: none;"><font color="#FF7900">Home</font></a></b></td>
<td><img src="https://vigilance.fr/images/1x1.gif" alt="" width="19" height="1" border="0"></td><td align="center"><b><a href="https://vigilance.fr/offer/Computer-vulnerabilities-watch-and-alert" class="blancorange">Offer</a></b></td>
<td><img src="https://vigilance.fr/images/1x1.gif" alt="" width="19" height="1" border="0"></td><td align="center"><b><a href="https://vigilance.fr/service/computer-vulnerability" class="blancorange">Service</a></b></td>
<td><img src="https://vigilance.fr/images/1x1.gif" alt="" width="19" height="1" border="0"></td><td align="center"><b><a href="https://vigilance.fr/?action=1135154048&langue=2" class="blancorange">Vulnerabilities</a></b></td>
<td><img src="https://vigilance.fr/images/1x1.gif" alt="" width="19" height="1" border="0"></td><td align="center"><b><a href="https://vigilance.fr/documents?langue=2" class="blancorange">Documents</a></b></td>
<td><img src="https://vigilance.fr/images/1x1.gif" alt="" width="19" height="1" border="0"></td><td align="center"><b><a href="https://vigilance.fr/?action=477033988&langue=2" class="blancorange">Contact</a></b></td>
</tr></table></td>
<td bgcolor="#000000" align="right"><table summary="" cellspacing="0" cellpadding="5" border="0"><tr><td bgcolor="#FF7900" id="bouton_essai_id_1"><b><a href="https://vigilance.fr/freetrial" style="color: #000000; text-decoration: none;"><font color="#000000">Request your free trial</font></a></b></td><td><img src="https://vigilance.fr/images/1x1.gif" alt="" width="3" height="1" border="0"/></td></tr></table></td>
</tr>
<tr><td bgcolor="#000000" colspan="5"><img src="https://vigilance.fr/images/1x1.gif" alt="" width="1" height="4" border="0"/></td></tr>
</table></nav></div><div id="bandeauscrollable"><form name="lc_form_2" action="https://vigilance.fr/?gentime=1768085495" method="POST" accept-charset="UTF-8"><input type="HIDDEN" name="origine" id="mpa_origine" value="1422249506"><input type="HIDDEN" name="langue" id="mpa_langue" value="2">
<table summary="" width="100%" cellspacing="25" cellpadding="0" border="0">
<tr>
<td width="100%"><div style="line-height: 1.4em;"><img src="https://vigilance.fr/images/orange_puce/check.png" border="0" width="20" height="16" alt="" title="">For <b>27 years</b>, the <b>Vigilance Computer Vulnerability Alerts</b> team has been watching public <a href="https://vigilance.fr/offer/Computer-vulnerabilities-watch-and-alert" style="color: #000000;"><font color="#000000">computer vulnerabilities</font></a>, and then presenting their <b>workarounds</b> and <b>security fixes</b> in <b>simple bulletins</b>.<br><img src="https://vigilance.fr/images/orange_puce/check.png" border="0" width="20" height="16" alt="" title="">Each subscriber <b>customizes</b> the software to monitor, and receives an <b>alert</b> by email, RSS feed or via the API, as soon as Vigilance Orange Business publishes an <b>announce</b>.<br><img src="https://vigilance.fr/images/orange_puce/check.png" border="0" width="20" height="16" alt="" title="">This bulletin generates a <b>task</b> to perform in an online calendar, or is injected into an <b>incident ticket system</b>. Administrators then deploy the required <b>fixes</b> to <b>secure</b> their IT systems.
</div><br><table summary="" cellspacing="0" cellpadding="6" border="0">
<tr>
<td style="border: 1px solid #4BB4E6; background-color: #4BB4E6"><b><a href="https://vigilance.fr/offer/Computer-vulnerabilities-watch-and-alert" style="color: #000000; text-decoration: none;"><font color="#000000">Our offer</font></a></b></td>
<td><img src="https://vigilance.fr/images/1x1.gif" alt="" width="15" height="1" border="0"></td>
<td bgcolor="#FF7900" id="bouton_essai_id_2"><b><a href="https://vigilance.fr/freetrial" style="color: #000000; text-decoration: none;"><font color="#000000">Request your free trial</font></a></b></td>
</tr>
</table>
</td>
<td rowspan="2" valign="bottom"><img loading="lazy" decoding="async" src="https://vigilance.fr/images/deco/ordinateurs.gif" width="320" height="164" alt="" border="0"></td>
</tr>
</table>
<table summary="" width="100%" cellspacing="25" cellpadding="0" border="0" bgcolor="#EEEEEE">
<tr>
<td><center><h1 style="font-weight: bold; font-size: 1.2em; padding:0; margin:0;">Bulletins disclosed by Vigilance Computer Vulnerability Alerts</h1></center>
</td>
</tr>
<tr>
<td>
<article><table border="0" cellspacing="8" cellpadding="0" bgcolor="#FFFFFF" width="100%" style="border: 4px solid #C2C200; border-radius: 20px 20px 20px 0px; overflow: hidden; margin-bottom: 10px" summary=""><tr><td width="98%" style="text-align: left; overflow: auto;"><a href="https://vigilance.fr/vulnerability/Incus-privilege-escalation-via-incus-user-48695" class="noirorange"><b>Incus</b>: privilege escalation via incus-user</a><br>
<font size="-1"><i><a href="https://vigilance.fr/vulnerability/Incus-privilege-escalation-via-incus-user-48695" class="noirorange">An attacker can bypass restrictions of Incus, via incus-user, in order to escalate his privileges...</a></i></font></td>
</tr></table>
<table border="0" cellspacing="8" cellpadding="0" bgcolor="#FFFFFF" width="100%" style="border: 4px solid #C2C200; border-radius: 20px 20px 20px 0px; overflow: hidden; margin-bottom: 10px" summary=""><tr><td width="98%" style="text-align: left; overflow: auto;"><a href="https://vigilance.fr/vulnerability/Centreon-Web-multiple-vulnerabilities-dated-10-11-2025-48694" class="noirorange"><b>Centreon Web</b>: multiple vulnerabilities dated 10/11/2025</a><br>
<font size="-1"><i><a href="https://vigilance.fr/vulnerability/Centreon-Web-multiple-vulnerabilities-dated-10-11-2025-48694" class="noirorange">An attacker can use several vulnerabilities of Centreon Web, dated 10/11/2025...</a></i></font></td>
</tr></table>
<table border="0" cellspacing="8" cellpadding="0" bgcolor="#FFFFFF" width="100%" style="border: 4px solid #C2C200; border-radius: 20px 20px 20px 0px; overflow: hidden; margin-bottom: 10px" summary=""><tr><td width="98%" style="text-align: left; overflow: auto;"><a href="https://vigilance.fr/vulnerability/uv-write-access-via-Payload-Obfuscation-48692" class="noirorange"><b>uv</b>: write access via Payload Obfuscation</a><br>
<font size="-1"><i><a href="https://vigilance.fr/vulnerability/uv-write-access-via-Payload-Obfuscation-48692" class="noirorange">An attacker can bypass access restrictions of uv, via Payload Obfuscation, in order to alter data...</a></i></font></td>
</tr></table>
<table border="0" cellspacing="8" cellpadding="0" bgcolor="#FFFFFF" width="100%" style="border: 4px solid #C2C200; border-radius: 20px 20px 20px 0px; overflow: hidden; margin-bottom: 10px" summary=""><tr><td width="98%" style="text-align: left; overflow: auto;"><a href="https://vigilance.fr/vulnerability/Linux-kernel-two-vulnerabilities-dated-10-11-2025-48690" class="noirorange"><b>Linux kernel</b>: two vulnerabilities dated 10/11/2025</a><br>
<font size="-1"><i><a href="https://vigilance.fr/vulnerability/Linux-kernel-two-vulnerabilities-dated-10-11-2025-48690" class="noirorange">An attacker can use several vulnerabilities of the Linux kernel, dated 10/11/2025...</a></i></font></td>
</tr></table>
<table border="0" cellspacing="8" cellpadding="0" bgcolor="#FFFFFF" width="100%" style="border: 4px solid #C2C200; border-radius: 20px 20px 20px 0px; overflow: hidden; margin-bottom: 10px" summary=""><tr><td width="98%" style="text-align: left; overflow: auto;"><a href="https://vigilance.fr/vulnerability/djangorestframework-simplejwt-information-disclosure-via-for-user-48689" class="noirorange"><b>djangorestframework-<wbr>simplejwt</b>: information disclosure via for_user()</a><br>
<font size="-1"><i><a href="https://vigilance.fr/vulnerability/djangorestframework-simplejwt-information-disclosure-via-for-user-48689" class="noirorange">An attacker can bypass access restrictions to data of djangorestframework-<wbr>simplejwt, via for_user(), in order to read sensitive information...</a></i></font></td>
</tr></table>
<table border="0" cellspacing="8" cellpadding="0" bgcolor="#FFFFFF" width="100%" style="border: 4px solid #FF9F00; border-radius: 20px 20px 20px 0px; overflow: hidden; margin-bottom: 10px" summary=""><tr><td width="98%" style="text-align: left; overflow: auto;"><a href="https://vigilance.fr/vulnerability/PAN-OS-denial-of-service-via-Firewall-46854" class="noirorange"><b>PAN-OS</b>: denial of service via Firewall</a><br>
<font size="-1"><i><a href="https://vigilance.fr/vulnerability/PAN-OS-denial-of-service-via-Firewall-46854" class="noirorange">An attacker can cause a fatal error of PAN-OS, via Firewall, in order to trigger a denial of service...</a></i></font></td>
</tr></table>
<table border="0" cellspacing="8" cellpadding="0" bgcolor="#FFFFFF" width="100%" style="border: 4px solid #FF9F00; border-radius: 20px 20px 20px 0px; overflow: hidden; margin-bottom: 10px" summary=""><tr><td width="98%" style="text-align: left; overflow: auto;"><a href="https://vigilance.fr/vulnerability/Junos-OS-multiple-vulnerabilities-dated-09-04-2025-46848" class="noirorange"><b>Junos OS</b>: multiple vulnerabilities dated 09/04/2025</a><br>
<font size="-1"><i><a href="https://vigilance.fr/vulnerability/Junos-OS-multiple-vulnerabilities-dated-09-04-2025-46848" class="noirorange">An attacker can use several vulnerabilities of Junos OS, dated 09/04/2025...</a></i></font></td>
</tr></table>
<table border="0" cellspacing="8" cellpadding="0" bgcolor="#FFFFFF" width="100%" style="border: 4px solid #FF2929; border-radius: 20px 20px 20px 0px; overflow: hidden; margin-bottom: 10px" summary=""><tr><td width="98%" style="text-align: left; overflow: auto;"><a href="https://vigilance.fr/vulnerability/Windows-vulnerabilities-of-July-2024-44693" class="noirorange"><b>Windows</b>: vulnerabilities of July 2024</a><br>
<font size="-1"><i><a href="https://vigilance.fr/vulnerability/Windows-vulnerabilities-of-July-2024-44693" class="noirorange">An attacker can use several vulnerabilities of Microsoft products...</a></i></font></td>
</tr></table>
<table border="0" cellspacing="8" cellpadding="0" bgcolor="#FFFFFF" width="100%" style="border: 4px solid #FF9F00; border-radius: 20px 20px 20px 0px; overflow: hidden; margin-bottom: 10px" summary=""><tr><td width="98%" style="text-align: left; overflow: auto;"><a href="https://vigilance.fr/vulnerability/OpenBSD-double-free-via-iked-isakmpd-ECDH-Mode-46833" class="noirorange"><b>OpenBSD</b>: double free via iked/isakmpd ECDH Mode</a><br>
<font size="-1"><i><a href="https://vigilance.fr/vulnerability/OpenBSD-double-free-via-iked-isakmpd-ECDH-Mode-46833" class="noirorange">An attacker can force a double memory free of OpenBSD, via iked/isakmpd ECDH Mode, in order to trigger a denial of service, and possibly to run code...</a></i></font></td>
</tr></table>
<table border="0" cellspacing="8" cellpadding="0" bgcolor="#FFFFFF" width="100%" style="border: 4px solid #FF9F00; border-radius: 20px 20px 20px 0px; overflow: hidden; margin-bottom: 10px" summary=""><tr><td width="98%" style="text-align: left; overflow: auto;"><a href="https://vigilance.fr/vulnerability/Chrome-Edge-Opera-use-after-free-via-Site-Isolation-46826" class="noirorange"><b>Chrome | Edge | Opera</b>: use after free via Site Isolation</a><br>
<font size="-1"><i><a href="https://vigilance.fr/vulnerability/Chrome-Edge-Opera-use-after-free-via-Site-Isolation-46826" class="noirorange">An attacker can force the reuse of a freed memory area of Chrome | Edge | Opera, via Site Isolation, in order to trigger a denial of service, and possibly to run code...</a></i></font></td>
</tr></table>
<!-- step2:1768085495 -->
<table summary="" cellspacing="0" cellpadding="5" border="0"><tr><td bgcolor="#FF7900" id="bouton_essai_id_3"><b><a href="https://vigilance.fr/freetrial" style="color: #000000; text-decoration: none;"><font color="#000000">Request your free trial to see all bulletins</font></a></b></td></tr></table></article>
</td>
</tr>
<tr>
<td align="right"><b>Severities:</b> <font color="#1FCF1F"><b>1</b></font> = low, <font color="#C2C200"><b>2</b></font> = medium, <font color="#FF9F00"><b>3</b></font> = important, <font color="#FF2929"><b>4</b></font> = critical.</td>
</tr>
</table><article><table summary="" width="100%" cellspacing="25" cellpadding="0" border="0">
<tr>
<td colspan="2" width="66%"><h2>Daily activities</h2><ul class="pucecheck"><li><b>Computer vulnerabilities are discovered daily</b> and published on thousands of internet information sources by researchers or editors.</li>
<li>Vigilance Computer Vulnerability Alerts <b>announces</b> these public vulnerabilities and how to protect your systems. These bulletins are <b>customized</b> and sent to your teams.</li>
<li>Your teams <b>secure and protect</b> your IT assets and networks, based on Vigilance Orange Business notices, alerts and API.</li></ul></td>
<td width="33%" align="center"><img loading="lazy" decoding="async" src="https://vigilance.fr/images/deco/gyrophare.gif" width="89" height="100" alt="" border="0"></td>
</tr>
<tr>
<td width="33%" align="center"><img loading="lazy" decoding="async" src="https://vigilance.fr/images/deco/bdd.gif" width="104" height="100" alt="" border="0"></td>
<td colspan="2" width="66%"><h2>Your environment</h2><ul class="pucecheck"><li>A <b>database</b> of <b><a href="https://vigilance.fr/?action=1135154048&langue=2" style="color: #F16E00;"><font color="#F16E00">40,000 public vulnerabilities</font></a></b>.</li>
<li>The <b>100,000</b> vulnerability patches and workarounds.</li>
<li><b>Advisories</b> and <b>bulletins</b> in HTML, text, XML, PDF and RTF formats.</li>
<li><b>Announcements</b> with RSS feeds, with <b>summary</b> and <b>alerts</b> emails.</li>
<li>An <b>API</b>, a <b>task</b> calendar, or <b>incident ticket</b> creation.</li>
<li><b>Press review</b> on computer security.</li></ul></td>
</tr>
<tr>
<td colspan="2" width="66%"><h2>Your benefits</h2><ul class="pucecheck"><li><b>Customization</b> of monitored software and systems.</li>
<li><b>Simple bulletins</b>, offering <b>several weakness solutions</b>.</li>
<li><b>Save time</b> searching and managing vulnerabilities.</li>
<li>A <b>multi-user</b> space for your teams.</li>
<li>A vulnerability watch by our service for <b>27 years</b>.</li>
<li>A variety of licenses: internal, <b>outsourcing, SOC, MCS.</b></li></ul></td>
<td width="33%" align="center"><img loading="lazy" decoding="async" src="https://vigilance.fr/images/deco/bouclier.gif" width="83" height="100" alt="" border="0"></td>
</tr>
</table><br><center><table summary="" cellspacing="0" cellpadding="5" border="0"><tr><td bgcolor="#FF7900" id="bouton_essai_id_4"><b><a href="https://vigilance.fr/freetrial" style="color: #000000; text-decoration: none;"><font color="#000000">Request your free trial</font></a></b></td></tr></table></center></article><br>
</form>
</div><div id="bandeaubas" align="center"><footer><table width="100%" border="0" cellspacing="0" cellpadding="0" summary="">
<tr>
<td bgcolor="#FFFFFF" align="center" style="border-top: 1px solid #CCCCCC;">
<font color="#000000" size="2">© 1999-2026 <a href="https://vigilance.fr/?langue=2" style="color: #000000;"><font color="#000000">Vigilance Vulnerability Alerts</font></a>. Vigilance.fr is a service from <a href="https://www.orange-business.com/" target="_blank" rel="noreferrer noopener" style="color: #000000;"><font color="#000000">Orange Business</font></a>. <a href="https://vigilance.fr/?action=764265893&langue=2" style="color: #000000;"><font color="#000000">Legal notices</font></a>.</font><font size="2"> <a href="https://vigilance.fr/?action=466153322&langue=2" style="color: #000000;"><font color="#000000">Site map</font></a>.</font></td>
</tr>
</table></footer></div></body></html>