The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Each user customizes the list of software to track.

As soon as Vigil@nce publishes an alert for one of his software, the user receives a bulletin, containing an helpful explanation of the threat, its patches and workarounds.

The administrator then uses the online Vigil@nce diary in order to plan and track the security process.

Our offer...
public vulnerabilities
2 Node.js handlebars: Cross Site Scripting
1 Linux kernel: NULL pointer dereference via nf_nat_redirect_ipv4
2 Joomla Nice Ajax Poll: SQL injection
2 Synology Video Station: Cross Site Scripting
1 cURL: privilege escalation via the use of proxy using NTLM authentication
2 WordPress YAWPP: Cross Site Scripting
2 WordPress Wordfence Security: Cross Site Scripting
1 IBM Tivoli Directory Server, Security Directory Server: two vulnerabilities of GSKit
2 WordPress AGP Font Awesome Collection: Cross Site Scripting
2 WordPress WP Easy Poll: Cross Site Scripting
2 Cisco IP Phone: firmware change on SPA30X/SPA5xX
2 Cisco Unity Connection: Cross Site Request Forgery
2 Cisco Unified Communications Manager: identity theft via MRA
2 Cacti: SQL injection of graph.php rra_id
1 Linux kernel: privilege escalation via TLB synchronization between processors
recent vulnerabilities
2 Cisco Email Security Appliance: mail filter bypass
2 PostgreSQL: three vulnerabilities
4 Cisco ASA Software: buffer overflow of IKE
2 Linux kernel: use after free via iw_cxgb3
2 GTK+: integer overflow of gdk_cairo_set_source_pixbuf
2 WordPress Duplicator: Cross Site Request Forgery
2 Drupal CAS: information disclosure about user accounts
2 Drupal Embedded Media Field: URL based access control bypass
4 Google Chrome: six vulnerabilities
2 Joomla Scatalog: SQL injection of index.php
2 Joomla Subcategory: SQL injection of index.php
2 Cisco Prime Collaboration Provisioning: privilege escalation via the admininistrationinterface
3 Cacti: privilege escalation via authentication failure
2 Visual Studio: Cross Site Request Forgery via ASP.NET MVC5/6
4 Internet Explorer: multiple vulnerabilities

Vulnerabilities are discovered daily and published on thousands of internet information sources.
Vigil@nce describes these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
Your team secures and protects your networks based on Vigil@nce information and tools.

Your environment

  • A database describing more than 25000 vulnerabilities and their 40000 solutions.
  • A web space where each user defines his preferences.
  • Alert and synthesis e-mails, to inform your teams.
  • A customized tracking of your software and systems.
  • A diary to plan solutions to install, and to monitor the security process of each computer.
  • A manager view, and customized reports.

Your benefits

  • A customized watch on computer vulnerabilities and their solutions.
  • An experienced team at your service for more than 17 years.
  • A tool to monitor the security process of your networks and computers.
  • A CVE compatible solution.
  • A time saving for your team which concentrates on important tasks.