The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Each user customizes the list of software to track.

As soon as Vigil@nce publishes an alert for one of his software, the user receives a bulletin, containing an helpful explanation of the threat, its patches and workarounds.

The administrator then uses the online Vigil@nce diary in order to plan and track the security process.

Our offer...
public vulnerabilities
2 Cisco Unity Connection: Cross Site Request Forgery of CUCReports
An attacker can trigger a Cross Site Request Forgery in CUCReports of Cisco Unity Connection, in order to force the victim to perform operations...
2 ArcGIS for Server: two vulnerabilities
An attacker can use several vulnerabilities of ArcGIS for Server...
2 WordPress Facebook Page Photo Gallery: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Facebook Page Photo Gallery, in order to execute JavaScript code in the context of the web site...
2 WordPress prettyPhoto: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress prettyPhoto, in order to execute JavaScript code in the context of the web site...
2 WordPress eShop: two vulnerabilities
An attacker can use several vulnerabilities of WordPress eShop...
2 Joomla J-ClassifiedsManager: SQL injection
An attacker can use a SQL injection of Joomla J-ClassifiedsManager, in order to read or alter data...
2 F5 BIG-IP ASM: Cross Site Scripting of JSON Profile
An attacker can trigger a Cross Site Scripting with JSON data on F5 BIG-IP ASM, in order to execute JavaScript code in the context of the web site...
2 Cisco Unified Communications Manager: SQL injection
An attacker can use a SQL injection of Cisco Unified Communications Manager, in order to read or alter data...
2 WordPress Ultimate Product Catalogue Plugin: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Ultimate Product Catalogue Plugin, in order to execute JavaScript code in the context of the web site...
2 Fortinet FortiManager, FortiAnalyzer: Cross Site Scripting of Advanced Dataset Reports
An attacker can trigger a Cross Site Scripting in Advanced Dataset Reports of Fortinet FortiManager or FortiAnalyzer, in order to execute JavaScript code in the context of the web site...
  
recent vulnerabilities
2 WprdPress Albo Pretorio Online: four vulnerabilities
An attacker can use several vulnerabilities of WprdPress Albo Pretorio Online...
1 WordPress StageShow: open redirect
An attacker can deceive the user of WordPress StageShow, in order to redirect him to a malicious site...
2 WordPress MDC YouTube Downloader: Local File Inclusion
An attacker can traverse directories of WordPress MDC YouTube Downloader, in order to read a file outside the service root path...
2 WordPress Ninja Forms: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Ninja Forms, in order to execute JavaScript code in the context of the web site...
2 WordPress Swim Team: local File Inclusion
An attacker can specify a local file inclusion via WordPress Swim Team, in order to read any server file...
1 WordPress Custom Content Type Manager: code execution
An attacker can use a vulnerability of WordPress Custom Content Type Manager, in order to execute code...
1 Joomla Core: open redirect
An attacker can deceive the user of Joomla, in order to redirect him to a malicious site...
3 Joomla: file upload via CSRF
An attacker can upload a malicious file via a CSRF attack against Joomla, for example in order to upload a Trojan...
4 Adobe Flash Player: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Flash Player...
4 Adobe Flash Player: buffer overflow
An attacker can generate a buffer overflow of Adobe Flash Player, in order to trigger a denial of service, and possibly to execute code...


Vulnerabilities are discovered daily and published on thousands of internet information sources.
Vigil@nce describes these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
Your team secures and protects your networks based on Vigil@nce information and tools.

your environment

  • a database describing more than 25000 vulnerabilities and their 40000 solutions
  • a web space where each user defines his preferences
  • alert and synthesis e-mails, to inform your teams
  • a customized tracking of your software and systems
  • a diary to plan solutions to install, and to monitor the security process of each computer
  • a manager view, and customized reports

your benefits

  • a customized watch on computer vulnerabilities and their solutions
  • an experienced team at your service for more than 16 years
  • a tool to monitor the security process of your networks and computers
  • a CVE compatible solution
  • a time saving for your team which concentrates on important tasks