The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Each user customizes the list of software to track.

As soon as Vigil@nce publishes an alert for one of his software, the user receives a bulletin, containing an helpful explanation of the threat, its patches and workarounds.

The administrator then uses the online Vigil@nce diary in order to plan and track the security process.

Our offer...
public vulnerabilities
2 WordPress Aspose DOC Exporter: directory traversal
An attacker can traverse directories of WordPress Aspose DOC Exporter, in order to read a file outside the service root path...
2 Joomla Gallery WD: SQL injection
An attacker can use a SQL injection of Joomla Gallery WD, in order to read or alter data...
2 Cisco Unified CM: directory traversal
An attacker can traverse directories of Cisco Unified CM, in order to read a file outside the service root path...
2 Python requests: manipulating Cookies
An attacker can use Python requests clients, in order to force a cookie or to read a cookie...
2 TYPO3 Neos: read-write access
An authenticated attacker can bypass access restrictions of TYPO3 Neos, in order to read or alter data of other editors...
1 Wireshark 1.10: three vulnerabilities
An attacker can use several vulnerabilities of Wireshark 1.10...
1 Wireshark 1.12: seven vulnerabilities
An attacker can use several vulnerabilities of Wireshark 1.12...
1 TeX Live: file corruption via /tmp/mktexlsrtrees.tmp
A local attacker can create a symbolic link named /tmp/mktexlsrtrees.tmp, in order to alter the pointed file, with privileges of TeX Live...
1 Adobe Reader: unreachable memory reading via CoolType.dll
An attacker can force a read at an invalid address in CoolType.dll of Adobe Reader, in order to trigger a denial of service...
1 Windows: information disclosure via Schannel
An attacker, located as a Man-in-the-Middle, can force the Windows Schannel client to accept a weak algorithm, in order to more easily capture or alter exchanged data...
  
recent vulnerabilities
1 WordPress Wow Moodboard Lite: open redirect
An attacker can deceive the user of WordPress Wow Moodboard Lite, in order to redirect him to a malicious site...
2 WordPress WP Smiley: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress WP Smiley, in order to execute JavaScript code in the context of the web site...
2 Sophos Disk Encryption: read-write access via SEC and Sleep-mode
An attacker can bypass access restrictions of Sophos Disk Encryption via the Sleep-mode of Windows, in order to read or alter data...
2 WordPress WP Fast Cache: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress WP Fast Cache, in order to force the victim to perform operations...
2 Cisco Wireless LAN Controller: denial of service via TCP
An attacker can send a malicious TCP packet to Cisco Wireless LAN Controller, in order to trigger a denial of service...
1 ProFTPD: anonymous users are not limited
An anonymous attacker can use numerous sessions on ProFTPD, in order to bypass MaxClients to trigger a denial of service...
1 Drupal Chamilo integration: open redirect
An attacker can deceive the user of Drupal Chamilo integration, in order to redirect him to a malicious site...
2 Drupal Storage API: read-write access
An attacker can bypass access restrictions of Drupal Storage API, in order to read or alter data...
2 HP SiteScope: privilege escalation
An attacker can bypass restrictions of HP SiteScope, in order to escalate his privileges...
2 WordPress Hide Login: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress Hide Login, in order to force the victim to perform operations...


Vulnerabilities are discovered daily and published on thousands of internet information sources.
Vigil@nce describes these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
Your team secures and protects your networks based on Vigil@nce information and tools.

your environment

  • a database describing more than 20000 vulnerabilities and their 35000 solutions
  • a web space where each user defines his preferences
  • alert and synthesis e-mails, to inform your teams
  • a customized tracking of your software and systems
  • a diary to plan solutions to install, and to monitor the security process of each computer
  • a manager view, and customized reports

your benefits

  • a customized watch on computer vulnerabilities and their solutions
  • an experienced team at your service for more than 16 years
  • a tool to monitor the security process of your networks and computers
  • a CVE compatible solution
  • a time saving for your team which concentrates on important tasks