The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Each user customizes the list of software to track.

As soon as Vigil@nce publishes an alert for one of his software, the user receives a bulletin, containing an helpful explanation of the threat, its patches and workarounds.

The administrator then uses the online Vigil@nce diary in order to plan and track the security process.

Our offer...
public vulnerabilities
2 WordPress WP-CopyProtect: Cross Site Scripting of CopyProtect_nrc_text
An attacker can trigger a Cross Site Scripting in CopyProtect_nrc_text of WordPress WP-CopyProtect, in order to execute JavaScript code in the context of the web site...
2 Cisco Unified Communications Domain Manager: unauthorized access to the "bvsmweb" directory
An attacker can view the content of the directory "bvsmweb" in Cisco Unified Communications Domain Manager, in order to get maybe sensitive information...
2 Cisco Unified IP Phones 9900 Series: denial of service via RTP
An attacker can send a malicious RTP packet to Cisco Unified IP Phones 9900 Series, in order to trigger a denial of service...
2 Joomla Kunena: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla Kunena, in order to execute JavaScript code in the context of the web site...
2 TYPO3 pagenotfoundhandling: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of TYPO3 pagenotfoundhandling, in order to execute JavaScript code in the context of the web site...
2 Synology: SQL injection of Video Station
An attacker can use a SQL injection in Video Station of Synology, in order to read or alter data...
2 Synology: Cross Site Scripting of Download Station
An attacker can trigger a Cross Site Scripting in Download Station of Synology, in order to execute JavaScript code in the context of the web site...
2 Cisco Unified Communications Manager: password disclosure via the Web interface
An attacker can get "encrypted" passwords for Cisco Unified Communications Manager...
2 Cisco Nexus 9000 Series: information disclosure
An attacker can get sensitive information from the APIC of Cisco Nexus 9000 Series...
2 Cisco Unified Communications Manager: SQL injection of IM, Presence
An attacker can use a SQL injection in IM, Presence of Cisco Unified Communications Manager, in order to read or alter data...
  
recent vulnerabilities
2 WordPress NextGen Gallery: directory traversal
An attacker can traverse directories of WordPress NextGen Gallery, in order to read a file outside the service root path...
3 Openswan: denial of service via IKE Diffie-Hellman
An attacker can send a malicious IKE packet, to force an assertion error in a DH computation by Openswan, in order to trigger a denial of service...
3 Cisco ASR 1000: denial of service of VFR via IP
An attacker can send a malicious IP packet to Cisco ASR 1000, in order to trigger a denial of service...
3 Cisco ASR 1000: denial of service via IP
An attacker can send a malicious IP packet to Cisco ASR 1000, in order to trigger a denial of service...
2 Cisco ASR 1000: denial of service via SIP
An attacker can send a malicious SIP packet to Cisco ASR 1000, in order to trigger a denial of service...
3 Cisco ASR 1000: denial of service via IPv6
An attacker can send a malicious IPv6 packet to Cisco ASR 1000, in order to trigger a denial of service...
2 Cisco ASR 1000: denial of service via H.323
An attacker can send a malicious H.323 packet to Cisco ASR 1000, in order to trigger a denial of service...
2 Cisco ASR 1000: denial of service via L2TP
An attacker can send a malicious L2TP packet to Cisco ASR 1000, in order to trigger a denial of service...
2 Siemens SIMATIC S7-1200: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of Siemens SIMATIC S7-1200, in order to force the victim to perform operations...
2 Request Tracker: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Request Tracker, in order to run JavaScript code in the context of the web site...


Vulnerabilities are discovered daily and published on thousands of internet information sources.
Vigil@nce describes these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
Your team secures and protects your networks based on Vigil@nce information and tools.

your environment

  • a database describing more than 25000 vulnerabilities and their 40000 solutions
  • a web space where each user defines his preferences
  • alert and synthesis e-mails, to inform your teams
  • a customized tracking of your software and systems
  • a diary to plan solutions to install, and to monitor the security process of each computer
  • a manager view, and customized reports

your benefits

  • a customized watch on computer vulnerabilities and their solutions
  • an experienced team at your service for more than 16 years
  • a tool to monitor the security process of your networks and computers
  • a CVE compatible solution
  • a time saving for your team which concentrates on important tasks