The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Each user customizes the list of software to track.

As soon as Vigil@nce publishes an alert for one of his software, the user receives a bulletin, containing an helpful explanation of the threat, its patches and workarounds.

The administrator then uses the online Vigil@nce diary in order to plan and track the security process.

Our offer...
public vulnerabilities
2 WordPress Backup to Dropbox: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Backup to Dropbox, in order to execute JavaScript code in the context of the web site...
2 WordPress LeagueManager: SQL injection
An attacker can use a SQL injection of WordPress LeagueManager, in order to read or alter data...
2 WordPress UserPro: Cross Site Scripting of redirect_to
An attacker can trigger a Cross Site Scripting in redirect_to of WordPress UserPro, in order to execute JavaScript code in the context of the web site...
2 Palo Alto PAN-OS: external XML entity injection
An attacker can transmit malicious XML data to Palo Alto PAN-OS, in order to read a file, scan sites, or trigger a denial of service...
2 WordPress Store Locator Plus: mail injection
An attacker can use WordPress Store Locator Plus, in order to send spam emails...
2 WordPress Incoming Links: Cross Site Scripting via Referer
An attacker can trigger a Cross Site Scripting of WordPress Incoming Links, in order to execute JavaScript code in the context of the web site...
2 WordPress Esplanade: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Esplanade, in order to execute JavaScript code in the context of the web site...
2 Cisco AnyConnect Secure Mobility Client: privilege escalation via Identity Services Engine
An attacker can use Identity Services Engine of Cisco AnyConnect Secure Mobility Client, in order to escalate his privileges...
2 Cisco Unified MeetingPlace: external XML entity injection
An attacker can transmit malicious XML data to Cisco Unified MeetingPlace, in order to read a file, scan sites, or trigger a denial of service...
2 IBM Domino: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of IBM Domino, in order to execute JavaScript code in the context of the web site...
  
recent vulnerabilities
2 OpenBSD: code execution via patch and ed
An attacker can use a vulnerability in ed of Openbsd, in order to run code...
2 Joomla AP Portfolio: Cross Site Scripting of PrettyPhoto
An attacker can trigger a Cross Site Scripting in PrettyPhoto of Joomla AP Portfolio, in order to run JavaScript code in the context of the web site...
1 HP ArcSight Logger: incoherent complex searches
An HP ArcSight Logger administrator, who searches traces of a sensitive event, may miss this event...
2 Symantec Endpoint Protection: seven vulnerabilities
An attacker can use several vulnerabilities of Symantec Endpoint Protection...
3 IBM Tivoli Storage Manager FastBack: five vulnerabilities
An attacker can use several vulnerabilities of IBM Tivoli Storage Manager FastBack...
2 Cisco Unified Communications Manager: information disclosure via Prime Collaboration Deployment
An attacker can use a vulnerability in Prime Collaboration Deployment of Cisco Unified Communications Manager, in order to obtain sensitive information...
2 Cisco AnyConnect Secure Mobilty Client: directory traversal
An attacker can traverse directories of Cisco AnyConnect Secure Mobilty Client, in order to write a file outside the service root path...
2 Cisco Prime Central Hosted Collaboration Solution: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Prime Central Hosted Collaboration Solution, in order to run JavaScript code in the context of the web site...
2 Red Hat JBoss Operations Network: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Red Hat JBoss Operations Network, in order to run JavaScript code in the context of the web site...
2 Pulse Secure Connect Secure: Man-in-the-Middle of Hardware Acceleration
An attacker can perform a Man-in-the-Middle when the Hardware Acceleration is enabled on Pulse Secure Connect Secure, in order to read or alter TLS session data...


Vulnerabilities are discovered daily and published on thousands of internet information sources.
Vigil@nce describes these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
Your team secures and protects your networks based on Vigil@nce information and tools.

your environment

  • a database describing more than 25000 vulnerabilities and their 40000 solutions
  • a web space where each user defines his preferences
  • alert and synthesis e-mails, to inform your teams
  • a customized tracking of your software and systems
  • a diary to plan solutions to install, and to monitor the security process of each computer
  • a manager view, and customized reports

your benefits

  • a customized watch on computer vulnerabilities and their solutions
  • an experienced team at your service for more than 16 years
  • a tool to monitor the security process of your networks and computers
  • a CVE compatible solution
  • a time saving for your team which concentrates on important tasks