The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Each user customizes the list of software to track.

As soon as Vigil@nce publishes an alert for one of his software, the user receives a bulletin, containing an helpful explanation of the threat, its patches and workarounds.

The administrator then uses the online Vigil@nce diary in order to plan and track the security process.

Our offer...
public vulnerabilities
3 LibTIFF: multiple vulnerabilities
An attacker can use several vulnerabilities of LibTIFF...
3 HP SiteScope: privilege escalation
A remote attacker can use HP SiteScope, in order to escalate his privileges...
3 WordPress Platform: code execution
An attacker can use WordPress Platform, in order to execute PHP code...
3 WordPress PageLines: code execution
An attacker can use WordPress PageLines, in order to execute PHP code...
3 PHP: multiple vulnerabilities
An attacker can use several vulnerabilities of PHP...
3 Adobe Flash Player: use after free via UncompressViaZlibVariant
An attacker can invite the victim to display a malicious Adobe Flash Player animation, to force the usage of a freed memory area in ByteArray::UncompressViaZlibVariant, in order to trigger a denial of service, and possibly to execute code...
3 MySQL: several vulnerabilities of January 2015
Several vulnerabilities of Oracle MySQL were announced in January 2015...
3 Oracle Java: several vulnerabilities of January 2015
Several vulnerabilities of Oracle Java were announced in January 2015...
3 Oracle Communications: several vulnerabilities of January 2015
Several vulnerabilities of Communications Fusion were announced in January 2015...
3 Oracle Fusion: several vulnerabilities of January 2015
Several vulnerabilities of Oracle Fusion were announced in January 2015...
  
recent vulnerabilities
2 Siemens SIMATIC PCS 7: authenticating via Password Hashes
An attacker can use the password hash on Siemens SIMATIC PCS 7, in order to authenticate on the service...
2 SAS Visual Analytics: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of SAS Visual Analytics, in order to execute JavaScript code in the context of the web site...
2 SAS Enterprise GRC: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of SAS Enterprise GRC, in order to execute JavaScript code in the context of the web site...
2 Lifesize UVC Platform: privilege escalation
An attacker can use a vulnerability of Lifesize UVC Platform, in order to escalate his privileges...
2 Joomla Simple Email Form: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla Simple Email Form, in order to execute JavaScript code in the context of the web site...
1 Dnsmasq: information disclosure via setup_reply
An attacker can read a memory fragment via the setup_reply() function of Dnsmasq, in order to obtain sensitive information...
2 OpenFire: three vulnerabilities
An attacker can use several vulnerabilities of OpenFire...
2 Drupal Node Template: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Node Template, in order to execute JavaScript code in the context of the web site...
2 Drupal Keyword Research: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of Drupal Keyword Research, in order to force the victim to perform operations...
2 Drupal HybridAuth Social Login: information disclosure
An attacker can read the Drupal HybridAuth Social Login database, in order to obtain sensitive information...


Vulnerabilities are discovered daily and published on thousands of internet information sources.
Vigil@nce describes these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
Your team secures and protects your networks based on Vigil@nce information and tools.

your environment

  • a database describing more than 20000 vulnerabilities and their 35000 solutions
  • a web space where each user defines his preferences
  • alert and synthesis e-mails, to inform your teams
  • a customized tracking of your software and systems
  • a diary to plan solutions to install, and to monitor the security process of each computer
  • a manager view, and customized reports

your benefits

  • a customized watch on computer vulnerabilities and their solutions
  • an experienced team at your service for more than 16 years
  • a tool to monitor the security process of your networks and computers
  • a CVE compatible solution
  • a time saving for your team which concentrates on important tasks