The chat responses are generated using Generative AI technology for intuitive search and may not be entirely accurate. They are not intended as professional advice. For full details, including our use rights, privacy practices and potential export control restrictions, please refer to our Generative AI Service Privacy Information. As this is a test version, please let us know if something irritating comes up. Like you get recommended a chocolate fudge ice cream instead of an energy managing application. If that occurs, please use the feedback button in our contact form!
Skip to content

Security notification

The Vilocify service constantly monitors thousands of sources (like official vendor advisory pages, vulnerability databases, security mailing lists, commercial security providers, security researcher blogs, etc.) for new vulnerability information. Whenever Vilocify detects vulnerability information affecting any of the components in its monitoring, a corresponding security notification is published. A security notification includes a detailed description of all vulnerabilities fixed in a new vendor patch, version or package for the affected components. We're publishing notifications for every CVE that's published at NVD, thus offering CVE completeness from September 2020 of components that exist in our database. In addition, we also monitor the European Vulnerability Database (EUVD) and complement thereby CVE completeness with notifying vulnerabilities, not assigned a CVE, thus achieving EUVD completeness as well. More information regarding our notifications can be found in the corresponding section of the Vilocify Docs.

Most times security notifications are based on official vendor advisories. In cases where no official advisory is available, Vilocify analyzes and processes the available information in order to create a notification.

You can find all notifications published by the Vilocify service in the notification section of the Vilocify Portal, and the Vilocify REST API.