The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Each user customizes the list of software to track.

As soon as Vigil@nce publishes an alert for one of his software, the user receives a bulletin, containing an helpful explanation of the threat, its patches and workarounds.

The administrator then uses the online Vigil@nce diary in order to plan and track the security process.

Our offer...
public vulnerabilities
2 FreeBSD: memory corruption via bsdiff
2 Perl: code execution via Opportunistic Loading
2 Joomla com_showdown: SQL injection
2 SIMATIC NET PC-Software: denial of service via OPC-UA
2 Joomla Huge-IT Slider: two vulnerabilities
2 WordPress Code Snippets: Cross Site Scripting
2 WordPress Contact Form to Email: Cross Site Scripting
2 libidn: three vulnerabilities
2 KDE Frameworks: directory traversal via kf5-karchive
2 Android Contacts: phone calls
2 Joomla Fancy Tag Cloud: read-write access
2 MIT krb5: denial of service via KDC TGT Only
2 Node.js gmail-js: Cross Site Scripting via DOM
2 Node.js swagger-ui: Cross Site Scripting
2 Node.js jQuery-UI: Cross Site Scripting via dialog
  
recent vulnerabilities
2 MySQL: two vulnerabilities
2 QEMU: buffer overflow via xlnx.xps-ethernetlite
3 WordPress Genesis Simple Defaults: file upload via uploadFavicon.php
2 Microsoft Windows Journal: buffer overflow via a jtp file
3 IBM WebSphere Application Server: code execution via serialized objects
1 OpenBSD: blocking weak hash algorithms via SNI
4 Adobe Flash Player: multiple vulnerabilities
4 Cisco Email Security Appliance: privilege escalation via a test interface
2 IBM AIX: directory traversal via Tivoli Lightweight Infrastructure
3 OpenSSL: seven vulnerabilities
2 Openfire: Cross Site Scripting via setup-admin-settings_test.jsp
2 Drupal Core: three vulnerabilities
2 Cisco IOS, IOS XE: file reading via "Application-Hosting Framework"
2 Cisco IOS, IOS XE: denial of service via "Data in Motion"
2 Cisco IOS, IOS XE: code execution via iox


Vulnerabilities are discovered daily and published on thousands of internet information sources.
Vigil@nce describes these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
Your team secures and protects your networks based on Vigil@nce information and tools.

Your environment

  • A database describing more than 25000 vulnerabilities and their 40000 solutions.
  • A web space where each user defines his preferences.
  • Alert and synthesis e-mails, to inform your teams.
  • A customized tracking of your software and systems.
  • A diary to plan solutions to install, and to monitor the security process of each computer.
  • A manager view, and customized reports.

Your benefits

  • A customized watch on computer vulnerabilities and their solutions.
  • An experienced team at your service for more than 17 years.
  • A tool to monitor the security process of your networks and computers.
  • A CVE compatible solution.
  • A time saving for your team which concentrates on important tasks.