Outiref

Code source de l'URL : http://vigilance.fr/

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en" xmlns:og="http://ogp.me/ns#">
<head>
 <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
 <meta http-equiv="Content-Script-Type" content="text/javascript">
 <meta http-equiv="Content-Style-Type" content="text/css">
 <meta http-equiv="Content-Language" content="en">
 <link rel="alternate" hreflang="en" href="https://vigilance.fr/?langue=2"/>
 <link rel="alternate" hreflang="fr" href="https://vigilance.fr/?langue=1"/>
 <link rel="canonical" href="https://vigilance.fr/?langue=2"/>
 <meta property="og:url" content="https://vigilance.fr/?langue=2" />
 <title>Vigilance Computer Vulnerability Alerts</title>
 <style type="text/css">
<!--

   @font-face {
     font-family: OrangeHelvNeue55;
     src:url("https://vigilance.fr/images/orange_police/EOT/HelvNeue55_W1G.eot?#iefix");
     src:url("https://vigilance.fr/images/orange_police/EOT/HelvNeue55_W1G.eot?#iefix") format("eot"),
     url("https://vigilance.fr/images/orange_police/WOFF2/HelvNeue55_W1G.woff2") format("woff2"),
     url("https://vigilance.fr/images/orange_police/WOFF/HelvNeue55_W1G.woff") format("woff"),
     url("https://vigilance.fr/images/orange_police/TTF/HelvNeue55_W1G.ttf") format("truetype"),
     url("https://vigilance.fr/images/orange_police/SVG/HelvNeue55_W1G.svg") format("svg");
     font-weight: normal;
     font-style: normal;
     font-display: swap;
   }
   body {font-family: OrangeHelvNeue55, Arial, Helvetica, sans-serif; text-align: justify; font-size: 11pt;}
   table {font-family: OrangeHelvNeue55, Arial, Helvetica, sans-serif; text-align: justify; font-size: 11pt;}
   form input.stylebouton {font-family: OrangeHelvNeue55, Arial, Helvetica, sans-serif; text-align: justify; font-size: 11pt;}
   ul {margin-top: 0; margin-bottom: 0;}
   ul.pucecarre {list-style-image:url("https://vigilance.fr/images/orange_puce/carre.gif"); line-height: 1.4em;}
   ul.pucecheck {list-style-image:url("https://vigilance.fr/images/orange_puce/check.png"); line-height: 1.4em;}
   ul.pucechevron {list-style-image:url("https://vigilance.fr/images/orange_puce/chevron.gif"); line-height: 1.4em;}
   ul.pucefleche {list-style-image:url("https://vigilance.fr/images/orange_puce/fleche.gif"); line-height: 1.4em;}
   a.noirorange {text-decoration:none;}
   a.noirorange:link {color: #000000;}
   a.noirorange:visited {color: #000000;}
   a.noirorange:hover {color: #F16E00;}
   a.blancorange {text-decoration:none;}
   a.blancorange:link {color: #FFFFFF;}
   a.blancorange:visited {color: #FFFFFF;}
   a.blancorange:hover {color: #FF7900;}
 -->
</style>
 <meta http-equiv="keywords" content="alerts, computer, service, solutions, vigilance, vulnerabilities, vulnerability, watch">
 <meta name="keywords" content="alerts, computer, service, solutions, vigilance, vulnerabilities, vulnerability, watch">
 <meta name="description" content="Vigilance Computer Vulnerability Alerts is a watch service on computer vulnerabilities and their solutions.">
 <link rel="shortcut icon" href="https://vigilance.fr/images/favicon/favicon.ico" />
 <link rel="icon" sizes="32x32" href="https://vigilance.fr/images/favicon/favicon-32.png" type="image/png" />
 <link rel="icon" sizes="48x48" href="https://vigilance.fr/images/favicon/favicon-48.png" type="image/png" />
 <link rel="icon" sizes="144x144" href="https://vigilance.fr/images/favicon/favicon-144.png" type="image/png" />
 <link rel="icon" sizes="256x256" href="https://vigilance.fr/images/favicon/favicon-256.png" type="image/png" />
 <meta name="author" content="Vigilance Alertes Vulnérabilités"/>
 <meta property="og:type" content="website" />
 <meta property="og:title" content="Vigilance Computer Vulnerability Alerts" />
 <meta property="og:description" content="Vigilance Computer Vulnerability Alerts is a watch service on computer vulnerabilities and their solutions." />
 <meta property="og:image" content="https://vigilance.fr/images/opengraph/vigilance_en.png" />
 <meta property="og:image:type" content="image/png" />
 <meta property="og:locale" content="en_US" />
 <meta property="og:site_name" content="Vigilance Alertes Vulnérabilités" />
 <meta name="twitter:site" content="@vigilance_en" />
 <meta name="twitter:creator" content="@vigilance_en" />
 <meta name="twitter:card" content="summary_large_image" />
 <meta name="viewport" content="width=device-width" />
 <script type="application/ld+json">
  {
    "@context" : "https://schema.org",
    "@type" : "WebSite",
    "name" : "Vigilance Alertes Vulnérabilités",
    "alternateName" : ["Vigilance Vulnérabilités", "Vigilance Orange", "Vigilance.fr"],
    "url" : "https://vigilance.fr/",
    "headline" : "Vigilance Computer Vulnerability Alerts",
    "author" : {
      "@type" : "Organization",
      "name" : "Vigilance Alertes Vulnérabilités",
      "alternateName" : ["Vigilance Vulnérabilités", "Vigilance Orange", "Vigilance.fr"],
      "url" : "https://vigilance.fr/"
    }
  }
 </script>
 <link rel="alternate" type="application/rss+xml" title="Vigilance.fr - public vulnerabilities" href="https://vigilance.fr/rsspublic?langue=2">
 <style type="text/css">
<!--

   /* Générique */
   body {
     margin: 0 0 0 0;
     background-color: #FFFFFF;
     padding-left: 0; padding-right: 0;
     padding-top: 132px;
     padding-bottom: 1.3em;
   }
   div#bandeauhaut {
     position: absolute;
     left: 0; top: 0;
     width: 100%;
     height: 132px;
     background-color: #000000;
   }
   div#bandeauscrollable {
     padding-left: 0; padding-right: 0;
   }
   div#bandeaubas {
     position: absolute;
     left: 0; bottom: 0;
     width: 100%;
     height: 1.2em;
     background-color: #ffffff;
   }
   /* Mozilla, Firefox, Internet Explorer 7 */
   @media screen {
     body>div#bandeauhaut {
       position: fixed;
     }
     body>div#bandeaubas {
       position: fixed;
     }
   }
   /* Internet Explorer 6 */
   * html body {
     overflow: hidden;
   }
   * html div#bandeauscrollable {
     overflow: auto;
     height: 100%;
   }
 -->
</style>
 <!--[if IE]>
  <STYLE TYPE="text/css">
     form input.stylebouton {
       padding: 0 .25em;
       width: 0;
       overflow: visible;
       vertical-align: ;
     }
  </STYLE>
 <![endif]-->
 <!--[if !IE]>-->
  <style type="text/css">
<!--

     .stylebouton {
       background-color: #000000;
       color: #FFFFFF;
       border: none;
       padding: 5px;
       margin: 1px;
       font-weight: bold;
     }
  -->
</style>
 <!--<![endif]-->
</head>
<!-- step1:1768085495 -->
<body bgcolor="#FFFFFF"><div id="bandeauhaut"><nav><table summary="" cellspacing="0" cellpadding="0" border="0">
  <tr width="100%">
    <td bgcolor="#000000" width="25"><img src="https://vigilance.fr/images/1x1.gif" alt="" width="25" height="100" border="0"/></td>
    <td bgcolor="#000000" width="139"><a href="https://vigilance.fr/?langue=2"><img src="https://vigilance.fr/images/logo/ob.png" border="0" width="232" height="50" alt="Orange Business" title="Orange Business"></a></td>
    <td bgcolor="#000000" width="25"><img src="https://vigilance.fr/images/1x1.gif" alt="" width="25" height="100" border="0"/></td>
    <td bgcolor="#000000" width="100%" align="center"><a href="https://vigilance.fr/?langue=2"><img src="https://vigilance.fr/images/logo/vigilance_en.png" border="0" width="198" height="66" alt="Vigilance Computer Vulnerability Alerts" title="Vigilance Computer Vulnerability Alerts"></a></td>
    <td bgcolor="#000000" align="right"><form name="lc_form_1" action="https://vigilance.fr/?gentime=1768085495" method="POST" accept-charset="UTF-8"><input type="HIDDEN" name="origine" id="mpa_origine" value="1422249506"><input type="HIDDEN" name="langue" id="mpa_langue" value="2"><table summary="" cellspacing="0" cellpadding="0" border="0">
      <tr><td><input type="TEXT" name="texte" id="mpa_texte" value="" size="8" title="Pattern to find in vulnerabilities"></td>
        <td><input type="IMAGE" name="rechtexte" id="mpa_rechtexte" src="https://vigilance.fr/images/icone45x36/loupe.png" alt="Find" title="Find" onclick="JavaScript:if (document.lc_form_1.texte.value == false) {alert(&#039;Pattern to find in vulnerabilities is compulsory.&#039;); return(false);} return(true);"><script type="text/javascript" language="JavaScript">
<!--
function lc_cliqueboutonimage(ref)  {if ((typeof(document.getElementById)!="undefined")) {document.getElementById(ref).click();}}// -->
</script><input type="HIDDEN" name="form_premier_bouton" id="mpa_form_premier_bouton" value="rechtexte"></td>
        <td><a href="https://vigilance.fr/?langue=1"><img src="https://vigilance.fr/images/icone45x36/langue_fr.gif" border="0" width="45" height="36" alt="Version française" title="Version française"></a></td>
        <td></td>
        <td><a href="https://vigilance.fr/subscriber"><img src="https://vigilance.fr/images/icone45x36/abonne.png" border="0" width="45" height="36" alt="Subscriber area" title="Subscriber area"></a></td>
      </tr>
    </table></form></td>
  </tr>
  <tr width="100%">
    <td bgcolor="#000000" width="25"></td>
    <td bgcolor="#000000" colspan="3"><table summary="" cellspacing="0" cellpadding="0" border="0"><tr><td align="center"><b><a href="https://vigilance.fr/?langue=2" style="color: #FF7900; text-decoration: none;"><font color="#FF7900">Home</font></a></b></td>
<td><img src="https://vigilance.fr/images/1x1.gif" alt="" width="19" height="1" border="0"></td><td align="center"><b><a href="https://vigilance.fr/offer/Computer-vulnerabilities-watch-and-alert" class="blancorange">Offer</a></b></td>
<td><img src="https://vigilance.fr/images/1x1.gif" alt="" width="19" height="1" border="0"></td><td align="center"><b><a href="https://vigilance.fr/service/computer-vulnerability" class="blancorange">Service</a></b></td>
<td><img src="https://vigilance.fr/images/1x1.gif" alt="" width="19" height="1" border="0"></td><td align="center"><b><a href="https://vigilance.fr/?action=1135154048&amp;langue=2" class="blancorange">Vulnerabilities</a></b></td>
<td><img src="https://vigilance.fr/images/1x1.gif" alt="" width="19" height="1" border="0"></td><td align="center"><b><a href="https://vigilance.fr/documents?langue=2" class="blancorange">Documents</a></b></td>
<td><img src="https://vigilance.fr/images/1x1.gif" alt="" width="19" height="1" border="0"></td><td align="center"><b><a href="https://vigilance.fr/?action=477033988&amp;langue=2" class="blancorange">Contact</a></b></td>
</tr></table></td>
    <td bgcolor="#000000" align="right"><table summary="" cellspacing="0" cellpadding="5" border="0"><tr><td bgcolor="#FF7900" id="bouton_essai_id_1"><b><a href="https://vigilance.fr/freetrial" style="color: #000000; text-decoration: none;"><font color="#000000">Request&nbsp;your&nbsp;free&nbsp;trial</font></a></b></td><td><img src="https://vigilance.fr/images/1x1.gif" alt="" width="3" height="1" border="0"/></td></tr></table></td>
  </tr>
  <tr><td bgcolor="#000000" colspan="5"><img src="https://vigilance.fr/images/1x1.gif" alt="" width="1" height="4" border="0"/></td></tr>
</table></nav></div><div id="bandeauscrollable"><form name="lc_form_2" action="https://vigilance.fr/?gentime=1768085495" method="POST" accept-charset="UTF-8"><input type="HIDDEN" name="origine" id="mpa_origine" value="1422249506"><input type="HIDDEN" name="langue" id="mpa_langue" value="2">
<table summary="" width="100%" cellspacing="25" cellpadding="0" border="0">
  <tr>
    <td width="100%"><div style="line-height: 1.4em;"><img src="https://vigilance.fr/images/orange_puce/check.png" border="0" width="20" height="16" alt="" title="">For <b>27 years</b>, the <b>Vigilance Computer Vulnerability Alerts</b> team has been watching public <a href="https://vigilance.fr/offer/Computer-vulnerabilities-watch-and-alert" style="color: #000000;"><font color="#000000">computer vulnerabilities</font></a>, and then presenting their <b>workarounds</b> and <b>security fixes</b> in <b>simple bulletins</b>.<br><img src="https://vigilance.fr/images/orange_puce/check.png" border="0" width="20" height="16" alt="" title="">Each subscriber <b>customizes</b> the software to monitor, and receives an <b>alert</b> by email, RSS feed or via the API, as soon as Vigilance Orange Business publishes an <b>announce</b>.<br><img src="https://vigilance.fr/images/orange_puce/check.png" border="0" width="20" height="16" alt="" title="">This bulletin generates a <b>task</b> to perform in an online calendar, or is injected into an <b>incident ticket system</b>. Administrators then deploy the required <b>fixes</b> to <b>secure</b> their IT systems.
</div><br><table summary="" cellspacing="0" cellpadding="6" border="0">
<tr>
  <td style="border: 1px solid #4BB4E6; background-color: #4BB4E6"><b><a href="https://vigilance.fr/offer/Computer-vulnerabilities-watch-and-alert" style="color: #000000; text-decoration: none;"><font color="#000000">Our offer</font></a></b></td>
  <td><img src="https://vigilance.fr/images/1x1.gif" alt="" width="15" height="1" border="0"></td>
  <td bgcolor="#FF7900" id="bouton_essai_id_2"><b><a href="https://vigilance.fr/freetrial" style="color: #000000; text-decoration: none;"><font color="#000000">Request&nbsp;your&nbsp;free&nbsp;trial</font></a></b></td>
</tr>
</table>
    </td>
    <td rowspan="2" valign="bottom"><img loading="lazy" decoding="async" src="https://vigilance.fr/images/deco/ordinateurs.gif" width="320" height="164" alt="" border="0"></td>
  </tr>
</table>
<table summary="" width="100%" cellspacing="25" cellpadding="0" border="0" bgcolor="#EEEEEE">
  <tr>
   <td><center><h1 style="font-weight: bold; font-size: 1.2em; padding:0; margin:0;">Bulletins disclosed by Vigilance Computer Vulnerability Alerts</h1></center>
</td>
  </tr>
  <tr>
    <td>
     <article><table border="0" cellspacing="8" cellpadding="0" bgcolor="#FFFFFF" width="100%" style="border: 4px solid #C2C200; border-radius: 20px 20px 20px 0px; overflow: hidden; margin-bottom: 10px" summary=""><tr><td width="98%" style="text-align: left; overflow: auto;"><a href="https://vigilance.fr/vulnerability/Incus-privilege-escalation-via-incus-user-48695" class="noirorange"><b>Incus</b>: privilege escalation via incus-user</a><br>
<font size="-1"><i><a href="https://vigilance.fr/vulnerability/Incus-privilege-escalation-via-incus-user-48695" class="noirorange">An attacker can bypass restrictions of Incus, via incus-user, in order to escalate his privileges...</a></i></font></td>
</tr></table>
<table border="0" cellspacing="8" cellpadding="0" bgcolor="#FFFFFF" width="100%" style="border: 4px solid #C2C200; border-radius: 20px 20px 20px 0px; overflow: hidden; margin-bottom: 10px" summary=""><tr><td width="98%" style="text-align: left; overflow: auto;"><a href="https://vigilance.fr/vulnerability/Centreon-Web-multiple-vulnerabilities-dated-10-11-2025-48694" class="noirorange"><b>Centreon Web</b>: multiple vulnerabilities dated 10/11/2025</a><br>
<font size="-1"><i><a href="https://vigilance.fr/vulnerability/Centreon-Web-multiple-vulnerabilities-dated-10-11-2025-48694" class="noirorange">An attacker can use several vulnerabilities of Centreon Web, dated 10/11/2025...</a></i></font></td>
</tr></table>
<table border="0" cellspacing="8" cellpadding="0" bgcolor="#FFFFFF" width="100%" style="border: 4px solid #C2C200; border-radius: 20px 20px 20px 0px; overflow: hidden; margin-bottom: 10px" summary=""><tr><td width="98%" style="text-align: left; overflow: auto;"><a href="https://vigilance.fr/vulnerability/uv-write-access-via-Payload-Obfuscation-48692" class="noirorange"><b>uv</b>: write access via Payload Obfuscation</a><br>
<font size="-1"><i><a href="https://vigilance.fr/vulnerability/uv-write-access-via-Payload-Obfuscation-48692" class="noirorange">An attacker can bypass access restrictions of uv, via Payload Obfuscation, in order to alter data...</a></i></font></td>
</tr></table>
<table border="0" cellspacing="8" cellpadding="0" bgcolor="#FFFFFF" width="100%" style="border: 4px solid #C2C200; border-radius: 20px 20px 20px 0px; overflow: hidden; margin-bottom: 10px" summary=""><tr><td width="98%" style="text-align: left; overflow: auto;"><a href="https://vigilance.fr/vulnerability/Linux-kernel-two-vulnerabilities-dated-10-11-2025-48690" class="noirorange"><b>Linux kernel</b>: two vulnerabilities dated 10/11/2025</a><br>
<font size="-1"><i><a href="https://vigilance.fr/vulnerability/Linux-kernel-two-vulnerabilities-dated-10-11-2025-48690" class="noirorange">An attacker can use several vulnerabilities of the Linux kernel, dated 10/11/2025...</a></i></font></td>
</tr></table>
<table border="0" cellspacing="8" cellpadding="0" bgcolor="#FFFFFF" width="100%" style="border: 4px solid #C2C200; border-radius: 20px 20px 20px 0px; overflow: hidden; margin-bottom: 10px" summary=""><tr><td width="98%" style="text-align: left; overflow: auto;"><a href="https://vigilance.fr/vulnerability/djangorestframework-simplejwt-information-disclosure-via-for-user-48689" class="noirorange"><b>djangorestframework-<wbr>simplejwt</b>: information disclosure via for_user()</a><br>
<font size="-1"><i><a href="https://vigilance.fr/vulnerability/djangorestframework-simplejwt-information-disclosure-via-for-user-48689" class="noirorange">An attacker can bypass access restrictions to data of djangorestframework-<wbr>simplejwt, via for_user(), in order to read sensitive information...</a></i></font></td>
</tr></table>
<table border="0" cellspacing="8" cellpadding="0" bgcolor="#FFFFFF" width="100%" style="border: 4px solid #FF9F00; border-radius: 20px 20px 20px 0px; overflow: hidden; margin-bottom: 10px" summary=""><tr><td width="98%" style="text-align: left; overflow: auto;"><a href="https://vigilance.fr/vulnerability/PAN-OS-denial-of-service-via-Firewall-46854" class="noirorange"><b>PAN-OS</b>: denial of service via Firewall</a><br>
<font size="-1"><i><a href="https://vigilance.fr/vulnerability/PAN-OS-denial-of-service-via-Firewall-46854" class="noirorange">An attacker can cause a fatal error of PAN-OS, via Firewall, in order to trigger a denial of service...</a></i></font></td>
</tr></table>
<table border="0" cellspacing="8" cellpadding="0" bgcolor="#FFFFFF" width="100%" style="border: 4px solid #FF9F00; border-radius: 20px 20px 20px 0px; overflow: hidden; margin-bottom: 10px" summary=""><tr><td width="98%" style="text-align: left; overflow: auto;"><a href="https://vigilance.fr/vulnerability/Junos-OS-multiple-vulnerabilities-dated-09-04-2025-46848" class="noirorange"><b>Junos OS</b>: multiple vulnerabilities dated 09/04/2025</a><br>
<font size="-1"><i><a href="https://vigilance.fr/vulnerability/Junos-OS-multiple-vulnerabilities-dated-09-04-2025-46848" class="noirorange">An attacker can use several vulnerabilities of Junos OS, dated 09/04/2025...</a></i></font></td>
</tr></table>
<table border="0" cellspacing="8" cellpadding="0" bgcolor="#FFFFFF" width="100%" style="border: 4px solid #FF2929; border-radius: 20px 20px 20px 0px; overflow: hidden; margin-bottom: 10px" summary=""><tr><td width="98%" style="text-align: left; overflow: auto;"><a href="https://vigilance.fr/vulnerability/Windows-vulnerabilities-of-July-2024-44693" class="noirorange"><b>Windows</b>: vulnerabilities of July 2024</a><br>
<font size="-1"><i><a href="https://vigilance.fr/vulnerability/Windows-vulnerabilities-of-July-2024-44693" class="noirorange">An attacker can use several vulnerabilities of Microsoft products...</a></i></font></td>
</tr></table>
<table border="0" cellspacing="8" cellpadding="0" bgcolor="#FFFFFF" width="100%" style="border: 4px solid #FF9F00; border-radius: 20px 20px 20px 0px; overflow: hidden; margin-bottom: 10px" summary=""><tr><td width="98%" style="text-align: left; overflow: auto;"><a href="https://vigilance.fr/vulnerability/OpenBSD-double-free-via-iked-isakmpd-ECDH-Mode-46833" class="noirorange"><b>OpenBSD</b>: double free via iked/isakmpd ECDH Mode</a><br>
<font size="-1"><i><a href="https://vigilance.fr/vulnerability/OpenBSD-double-free-via-iked-isakmpd-ECDH-Mode-46833" class="noirorange">An attacker can force a double memory free of OpenBSD, via iked/isakmpd ECDH Mode, in order to trigger a denial of service, and possibly to run code...</a></i></font></td>
</tr></table>
<table border="0" cellspacing="8" cellpadding="0" bgcolor="#FFFFFF" width="100%" style="border: 4px solid #FF9F00; border-radius: 20px 20px 20px 0px; overflow: hidden; margin-bottom: 10px" summary=""><tr><td width="98%" style="text-align: left; overflow: auto;"><a href="https://vigilance.fr/vulnerability/Chrome-Edge-Opera-use-after-free-via-Site-Isolation-46826" class="noirorange"><b>Chrome | Edge | Opera</b>: use after free via Site Isolation</a><br>
<font size="-1"><i><a href="https://vigilance.fr/vulnerability/Chrome-Edge-Opera-use-after-free-via-Site-Isolation-46826" class="noirorange">An attacker can force the reuse of a freed memory area of Chrome | Edge | Opera, via Site Isolation, in order to trigger a denial of service, and possibly to run code...</a></i></font></td>
</tr></table>
<!-- step2:1768085495 -->
<table summary="" cellspacing="0" cellpadding="5" border="0"><tr><td bgcolor="#FF7900" id="bouton_essai_id_3"><b><a href="https://vigilance.fr/freetrial" style="color: #000000; text-decoration: none;"><font color="#000000">Request your free trial to see all bulletins</font></a></b></td></tr></table></article>
    </td>
  </tr>
  <tr>
    <td align="right"><b>Severities:</b> <font color="#1FCF1F"><b>1</b></font> = low, <font color="#C2C200"><b>2</b></font> = medium, <font color="#FF9F00"><b>3</b></font> = important, <font color="#FF2929"><b>4</b></font> = critical.</td>
  </tr>
</table><article><table summary="" width="100%" cellspacing="25" cellpadding="0" border="0">
  <tr>
    <td colspan="2" width="66%"><h2>Daily activities</h2><ul class="pucecheck"><li><b>Computer vulnerabilities are discovered daily</b> and published on thousands of internet information sources by researchers or editors.</li>
        <li>Vigilance Computer Vulnerability Alerts <b>announces</b> these public vulnerabilities and how to protect your systems. These bulletins are <b>customized</b> and sent to your teams.</li>
        <li>Your teams <b>secure and protect</b> your IT assets and networks, based on Vigilance Orange Business notices, alerts and API.</li></ul></td>
    <td width="33%" align="center"><img loading="lazy" decoding="async" src="https://vigilance.fr/images/deco/gyrophare.gif" width="89" height="100" alt="" border="0"></td>
  </tr>
  <tr>
    <td width="33%" align="center"><img loading="lazy" decoding="async" src="https://vigilance.fr/images/deco/bdd.gif" width="104" height="100" alt="" border="0"></td>
    <td colspan="2" width="66%"><h2>Your environment</h2><ul class="pucecheck"><li>A <b>database</b> of <b><a href="https://vigilance.fr/?action=1135154048&amp;langue=2" style="color: #F16E00;"><font color="#F16E00">40,000 public vulnerabilities</font></a></b>.</li>
	<li>The <b>100,000</b> vulnerability patches and workarounds.</li>
	<li><b>Advisories</b> and <b>bulletins</b> in HTML, text, XML, PDF and RTF formats.</li>
	<li><b>Announcements</b> with RSS feeds, with <b>summary</b> and <b>alerts</b> emails.</li>
	<li>An <b>API</b>, a <b>task</b> calendar, or <b>incident ticket</b> creation.</li>
	<li><b>Press review</b> on computer security.</li></ul></td>
  </tr>
  <tr>
    <td colspan="2" width="66%"><h2>Your benefits</h2><ul class="pucecheck"><li><b>Customization</b> of monitored software and systems.</li>
	<li><b>Simple bulletins</b>, offering <b>several weakness solutions</b>.</li>
	<li><b>Save time</b> searching and managing vulnerabilities.</li>
	<li>A <b>multi-user</b> space for your teams.</li>
	<li>A vulnerability watch by our service for <b>27 years</b>.</li>
	<li>A variety of licenses: internal, <b>outsourcing, SOC, MCS.</b></li></ul></td>
    <td width="33%" align="center"><img loading="lazy" decoding="async" src="https://vigilance.fr/images/deco/bouclier.gif" width="83" height="100" alt="" border="0"></td>
  </tr>
</table><br><center><table summary="" cellspacing="0" cellpadding="5" border="0"><tr><td bgcolor="#FF7900" id="bouton_essai_id_4"><b><a href="https://vigilance.fr/freetrial" style="color: #000000; text-decoration: none;"><font color="#000000">Request&nbsp;your&nbsp;free&nbsp;trial</font></a></b></td></tr></table></center></article><br>
</form>
</div><div id="bandeaubas" align="center"><footer><table width="100%" border="0" cellspacing="0" cellpadding="0" summary="">
  <tr>
    <td bgcolor="#FFFFFF" align="center" style="border-top: 1px solid #CCCCCC;">
<font color="#000000" size="2">© 1999-2026 <a href="https://vigilance.fr/?langue=2" style="color: #000000;"><font color="#000000">Vigilance Vulnerability Alerts</font></a>. Vigilance.fr is a service from <a href="https://www.orange-business.com/" target="_blank" rel="noreferrer noopener" style="color: #000000;"><font color="#000000">Orange Business</font></a>. <a href="https://vigilance.fr/?action=764265893&amp;langue=2" style="color: #000000;"><font color="#000000">Legal notices</font></a>.</font><font size="2"> <a href="https://vigilance.fr/?action=466153322&amp;langue=2" style="color: #000000;"><font color="#000000">Site map</font></a>.</font></td>
  </tr>
 </table></footer></div></body></html>