The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Each user customizes the list of software to track.

As soon as Vigil@nce publishes an alert for one of his software, the user receives a bulletin, containing an helpful explanation of the threat, its patches and workarounds.

The administrator then uses the online Vigil@nce diary in order to plan and track the security process.

Our offer...
public vulnerabilities
3 Oracle Java: several vulnerabilities of January 2015
Several vulnerabilities of Oracle Java were announced in January 2015...
3 Oracle Communications: several vulnerabilities of January 2015
Several vulnerabilities of Communications Fusion were announced in January 2015...
3 Oracle Fusion: several vulnerabilities of January 2015
Several vulnerabilities of Oracle Fusion were announced in January 2015...
3 Oracle Database: several vulnerabilities of January 2015
Several vulnerabilities of Oracle Database were announced in January 2015...
3 WordPress Pixabay Images: multiple vulnerabilities
An attacker can use several vulnerabilities of WordPress Pixabay Images...
3 Apache Santuario XML Security for Java: incorrect check of Streaming XML Signature
An attacker can create a malicious XML document, which is accepted as correctly signed by StAX of Apache Santuario XML Security for Java...
3 VLC Player: two vulnerabilities
An attacker can use several vulnerabilities of VLC Player...
1 Xen: denial of service via domctl
An attacker in a guest system can call three domctl of Xen, in order to trigger a denial of service...
1 Xen: denial of service via PCI Command Register
An attacker, located in an x86 HVM guest with a PCI device in PassThrough, can alter the PCI Command Register of Xen, in order to trigger a denial of service...
1 Xen: denial of service via XEN_DOMCTL_memory_mapping
An attacker, located in an x86 HVM guest with a PCI device in PassThrough, can use XEN_DOMCTL_memory_mapping() on Xen, in order to trigger a denial of service...
  
recent vulnerabilities
2 OpenBSD: denial of service via smtpd via TLS SNI
An attacker can use TLS SNI on the smtpd service of OpenBSD, in order to trigger a denial of service...
2 WordPress CP Multi-View Calendar: SQL injection
An attacker can use a SQL injection of WordPress CP Multi-View Calendar, in order to read or alter data...
3 WordPress Crayon Syntax Highlighter: privilege escalation via AJAX
An attacker can use AJAX on WordPress Crayon Syntax Highlighter, in order to escalate his privileges...
2 WordPress wp-mon: directory traversal
An attacker can traverse directories of WordPress wp-mon, in order to read a file outside the service root path...
2 Fortinet FortiManager: five vulnerabilities
An attacker can use several vulnerabilities of Fortinet FortiManager...
2 Linux kernel: privilege escalation via chown/execve
A local attacker can use an execve() during the chown() operation by the Linux kernel, in order to escalate his privileges...
2 libxml2: unreachable memory reading via Entity
An attacker can use a partial entity, to force a read at an invalid address in libxml2, in order to trigger a denial of service...
2 libxml2: unreachable memory reading via Comment
An attacker can use a partial comment, to force a read at an invalid address in libxml2, in order to trigger a denial of service...
1 IBM Tivoli Storage Manager: two vulnerabilities
An attacker can use two vulnerabilities of IBM Tivoli Storage Manager, in order to raise its privileges...
3 PHP 5.6: nine vulnerabilities
An attacker can use several vulnerabilities of PHP 5.6...


Vulnerabilities are discovered daily and published on thousands of internet information sources.
Vigil@nce describes these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
Your team secures and protects your networks based on Vigil@nce information and tools.

your environment

  • a database describing more than 20000 vulnerabilities and their 35000 solutions
  • a web space where each user defines his preferences
  • alert and synthesis e-mails, to inform your teams
  • a customized tracking of your software and systems
  • a diary to plan solutions to install, and to monitor the security process of each computer
  • a manager view, and customized reports

your benefits

  • a customized watch on computer vulnerabilities and their solutions
  • an experienced team at your service for more than 16 years
  • a tool to monitor the security process of your networks and computers
  • a CVE compatible solution
  • a time saving for your team which concentrates on important tasks