The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Each user customizes the list of software to track.

As soon as Vigil@nce publishes an alert for one of his software, the user receives a bulletin, containing an helpful explanation of the threat, its patches and workarounds.

The administrator then uses the online Vigil@nce diary in order to plan and track the security process.

Our offer...
public vulnerabilities
1 Linux kernel: NULL pointer dereference via propagate_one
1 Linux kernel: information disclosure via x25_negotiate_facilities
1 Linux kernel: information disclosure via snd_timer_user_tinterrupt
1 Linux kernel: information disclosure via snd_timer_user_ccallback
1 Linux kernel: information disclosure via snd_timer_user_params
2 WordPress WP Favorite Posts: Cross Site Scripting
2 WordPress Facebook With Login: SQL injection
2 WordPress Issuu Panel: directory traversal
2 Synology DS, RS, Photo Station: Cross Site Scripting
2 Cisco IOS XR: denial of service via SCP or SFTP
2 CA Single Sign-On: two vulnerabilities of Web Agent
2 Drupal Login one time: Cross Site Scripting
1 LibreOffice Impress: information disclosure via Background Image
2 AMD Piledriver: privilege escalation via Microcode
2 Cisco IOS, NX-OS: denial of service via Locator/ID Separation Protocol
  
recent vulnerabilities
1 VLC: buffer overflow via DecodeAdpcmImaQT
2 WordPress Jetpack: Cross Site Scripting
2 TYPO3 Media management: directory traversal
2 TYPO3 Formhandler: Cross Site Scripting
2 Cisco IOS XR/XE: denial of service via IPv6 Neighbor Discovery
2 Jenkins: seven vulnerabilities
2 PHP 5: five vulnerabilities
2 PHP 7: four vulnerabilities
1 libpng: buffer overflow via image size related macros
2 IBM WebSphere MQ: three vulnerabilities
2 pfSense: privilege escalation via Web
1 phpMyAdmin: three vulnerabilities
4 Google Chrome: multiple vulnerabilities
2 Drupal XML Sitemap: Cross Site Scripting
2 WordPress WP Fastest Cache: two vulnerabilities


Vulnerabilities are discovered daily and published on thousands of internet information sources.
Vigil@nce describes these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
Your team secures and protects your networks based on Vigil@nce information and tools.

Your environment

  • A database describing more than 25000 vulnerabilities and their 40000 solutions.
  • A web space where each user defines his preferences.
  • Alert and synthesis e-mails, to inform your teams.
  • A customized tracking of your software and systems.
  • A diary to plan solutions to install, and to monitor the security process of each computer.
  • A manager view, and customized reports.

Your benefits

  • A customized watch on computer vulnerabilities and their solutions.
  • An experienced team at your service for more than 17 years.
  • A tool to monitor the security process of your networks and computers.
  • A CVE compatible solution.
  • A time saving for your team which concentrates on important tasks.