The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Each user customizes the list of software to track.

As soon as Vigil@nce publishes an alert for one of his software, the user receives a bulletin, containing an helpful explanation of the threat, its patches and workarounds.

The administrator then uses the online Vigil@nce diary in order to plan and track the security process.

Our offer...
public vulnerabilities
1 Puppet: code execution via mcollective-puppet-agent
1 Windows: privilege escalation via Secure Boot
2 Cisco IP Phone 8800: bad permissions in the filesystem
2 Cisco IP Phone 8800: directory traversal via the license import
1 Mozilla NSS: update of the certification authority list
2 WordPress Cherry: file reading via Cherry
2 WordPress File Monitor: Cross Site Scripting via alertDesc
2 WordPress WP Mobile Detector: Cross Site Scripting via general[posts_per_page]
2 IBM QRadar SIEM: two vulnerabilities
2 Cisco Email Security Appliance: filtering bypass via Zip files
3 libxml2: five vulnerabilities
2 NetApp Snap Creator Framework: two vulnerabilities
2 Cisco Aggregation Services Router: denial of service via GTP
2 Apache Tomcat: denial of service via FileUpload
2 WordPress Core: eight vulnerabilities
recent vulnerabilities
1 Drupal Workbench Scheduler: changing disabled schedule
2 Cisco AnyConnect Secure Mobility Client: privilege escalation via INF
3 Dotclear: three vulnerabilities
2 WordPress Mail Masta: directory traversal
2 Pagure: Cross Site Scripting via File Attachment
2 Pagure: Cross Site Scripting via Raw File
2 OpenSSL: memory corruption via BN_bn2dec
2 Cisco FirePOWER: code execution via HTTP
2 OpenSSL: denial of service via DTLS Window
2 OpenSSL: denial of service via DTLS Reassembly
1 OpenBSD: receiving email copies
2 WordPress Akal Theme: Cross Site Scripting
2 WordPress Themes: directory traversal
1 Splunk Enterprise: open redirect
2 Apache mod_cluster: denial of service via MCMP

Vulnerabilities are discovered daily and published on thousands of internet information sources.
Vigil@nce describes these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
Your team secures and protects your networks based on Vigil@nce information and tools.

Your environment

  • A database describing more than 25000 vulnerabilities and their 40000 solutions.
  • A web space where each user defines his preferences.
  • Alert and synthesis e-mails, to inform your teams.
  • A customized tracking of your software and systems.
  • A diary to plan solutions to install, and to monitor the security process of each computer.
  • A manager view, and customized reports.

Your benefits

  • A customized watch on computer vulnerabilities and their solutions.
  • An experienced team at your service for more than 17 years.
  • A tool to monitor the security process of your networks and computers.
  • A CVE compatible solution.
  • A time saving for your team which concentrates on important tasks.