The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Each user customizes the list of software to track.

As soon as Vigil@nce publishes an alert for one of his software, the user receives a bulletin, containing an helpful explanation of the threat, its patches and workarounds.

The administrator then uses the online Vigil@nce diary in order to plan and track the security process.

Our offer...
public vulnerabilities
1 QEMU: memory leak via ehci_process_itd
1 QEMU: memory leak via virtio_gpu_resource_create_2d
1 Trend Micro Internet Security: NULL pointer dereference via tmnciesc
2 Synology DS/RS: Cross Site Scripting
2 Joomla J-BusinessDirectory: SQL injection
1 Xen: information disclosure via HVM CR0.TS/EM
2 WebKit: Man-in-the-Middle via Proxy CONNECT
2 Drupal Hosting: privilege escalation
2 FreeIPA: denial of service via cert_revoke
2 Drupal Panels: two vulnerabilities
2 Cisco Aironet: denial of service via 802.11
2 Cisco Aironet: privilege escalation via CLI
2 Cisco Aironet: denial of service via AMPDU
2 Openfire: Cross Site Scripting
2 Cisco IP Phone 8800: memory leak
recent vulnerabilities
3 Puppet: five vulnerabilities
3 Firefox: two vulnerabilities
2 WordPress InPost Gallery: directory traversal
2 WordPress InPost Gallery: Cross Site Scripting
2 Joomla JA K2 Filter: SQL injection
3 WordPress Userpro: file upload
2 Synology DS: privilege escalation via guest/admin
2 RoundCube: Cross Site Scripting via Area Href
3 BIND: assertion error via Options
2 Drupal Webform: file reading
3 ArcSight WINC Connector: code execution
3 Cisco ASA: denial of service via HTTPS
3 Cisco ASA: buffer overflow via Identity Firewall
2 Linux kernel: privilege escalation via Copy On Write, Dirty COW
2 libass: two vulnerabilities

Vulnerabilities are discovered daily and published on thousands of internet information sources.
Vigil@nce describes these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
Your team secures and protects your networks based on Vigil@nce information and tools.

Your environment

  • A database describing more than 25000 vulnerabilities and their 40000 solutions.
  • A web space where each user defines his preferences.
  • Alert and synthesis e-mails, to inform your teams.
  • A customized tracking of your software and systems.
  • A diary to plan solutions to install, and to monitor the security process of each computer.
  • A manager view, and customized reports.

Your benefits

  • A customized watch on computer vulnerabilities and their solutions.
  • An experienced team at your service for more than 17 years.
  • A tool to monitor the security process of your networks and computers.
  • A CVE compatible solution.
  • A time saving for your team which concentrates on important tasks.