The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Each user customizes the list of software to track.

As soon as Vigil@nce publishes an alert for one of his software, the user receives a bulletin, containing an helpful explanation of the threat, its patches and workarounds.

The administrator then uses the online Vigil@nce diary in order to plan and track the security process.

Our offer...
public vulnerabilities
1 busybox: bypass of modprobe filter
A privileged attacker can add path separator to module names, in order to make modprobe of busybox load forbidden modules...
1 Cisco Adaptive Security Appliance: lack of integrity check of IPsec flows
An attacker can change IPsec packets or inject new ones to be handled by Cisco Adaptive Security Appliance, in order to corrupt the plain text...
1 Wireshark: two vulnerabilities
An attacker can use several vulnerabilities of Wireshark...
1 curl: information disclosure via SMB
A attacker who controls a SMB server can read a memory fragment of the client process using curl, in order to obtain sensitive information...
1 Redhat OpenSSL: denial of service via locking management
An attacker can repeatedly connect to a TLS multithread server using the Redhat version of OpenSSL, in order to trigger a denial of service...
2 WordPress FeedWordPress: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress FeedWordPress, in order to execute JavaScript code in the context of the web site...
2 Cisco ASR 5000: denial of service via HTTP
An attacker can send a malicious HTTP packet to Cisco ASR 5000, in order to trigger a denial of service...
2 Drupal Camtasia Relay: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Camtasia Relay, in order to execute JavaScript code in the context of the web site...
2 stunnel: NULL pointer dereference
An attacker can force a NULL pointer to be dereferenced of stunnel, in order to trigger a denial of service...
2 Drupal Views: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Views, in order to execute JavaScript code in the context of the web site...
  
recent vulnerabilities
2 Cisco Adaptive Security Appliance: denial of service via OSPFv2
An attacker can send a specially crafted OSPFv2 packet to a device running Cisco Adaptive Security Appliance Software, in order to trigger a denial of service...
2 WordPress easy2map: SQL injection of Function.php
An attacker can use a SQL injection in Function.php of WordPress easy2map, in order to read or alter data...
4 Mozilla Firefox, Thunderbird, SeaMonkey: multiple vulnerabilities
An attacker can use several vulnerabilities of Firefox, Thunderbird, SeaMonkey...
3 Apple QuickTime: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple QuickTime...
2 Cisco NX-OS: escape to the system shell
An attacker can use special characters in commands for Cisco NX-OS, in order to get a system shell...
2 Cisco Adaptive Security Appliance: denial of service via SNMP
An attacker can send malicious SNMP packets to Cisco Adaptive Security Appliance, in order to trigger a denial of service...
4 Cisco Unified Communications Domain Manager: well known password for privileged account
An attacker can use a well known password for Cisco Unified Communications Domain Manager, in order to get root privileges...
1 curl: information disclosure via libidn
An attacker can retrieve a memory fragment from a process using libcurl, in order to get sensitive information...
2 TYPO3 CMS: six vulnerabilities
An attacker can use several vulnerabilities of TYPO3...
2 Drupal Views Bulk Operations: privilege escalation
An attacker can use the account list of Drupal Views Bulk Operations, in order to escalate his privileges...


Vulnerabilities are discovered daily and published on thousands of internet information sources.
Vigil@nce describes these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
Your team secures and protects your networks based on Vigil@nce information and tools.

your environment

  • a database describing more than 25000 vulnerabilities and their 40000 solutions
  • a web space where each user defines his preferences
  • alert and synthesis e-mails, to inform your teams
  • a customized tracking of your software and systems
  • a diary to plan solutions to install, and to monitor the security process of each computer
  • a manager view, and customized reports

your benefits

  • a customized watch on computer vulnerabilities and their solutions
  • an experienced team at your service for more than 16 years
  • a tool to monitor the security process of your networks and computers
  • a CVE compatible solution
  • a time saving for your team which concentrates on important tasks