The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Each user customizes the list of software to track.

As soon as Vigil@nce publishes an alert for one of his software, the user receives a bulletin, containing an helpful explanation of the threat, its patches and workarounds.

The administrator then uses the online Vigil@nce diary in order to plan and track the security process.

Our offer...
public vulnerabilities
1 QEMU: information disclosure via patch_instruction
3 BIND: denial of service via TKEY
1 Linux kernel: denial of service via PPC State
1 Windows: character injection via Microsoft Wireless Mouse
1 Dell OpenManage Server Administrator: directory traversal
2 WordPress Ocim MP3: SQL injection
1 WordPress Stop User Enumeration: security improvement
2 Pulse Secure Connect Secure: privilege escalation via RDP
2 McAfee VirusScan Enterprise: bypassing of self-protection
1 Linux kernel: five vulnerabilities of USB Device Descriptor
2 WordPress WP Ultimate Exporter: SQL injection
2 Linux kernel: integer overflow of aio_setup_single_vector
2 Drupal FileField: denial of service
2 Joomla JSN Poweradmin: Cross Site Scripting
2 WordPress User Submitted Posts: Cross Site Scripting
recent vulnerabilities
2 WordPress Jetpack: Cross Site Scripting
2 Apache Subversion: two vulnerabilities
2 PHP: integer overflow of ZipArchive-getFrom
1 Quagga: assertion error via bgp_dump_obuf
2 multiple vulnerabilities
2 Puppet: file reading via URL Decoding
2 Node.js Man-in-the-Middle
3 Veritas NetBackup: three vulnerabilities
1 Linux kernel: information disclosure via TIOCSETD
2 XStream: external XML entity injection
4 Firefox, Thunderbird: multiple vulnerabilities
2 Magento SmartWave QuickView: SQL injection
2 Magento MD Quickview: SQL injection
2 Magento Extreme Magento Quickshop: SQL injection
2 Magento Extreme Magento Ajaxcart: SQL injection

Vulnerabilities are discovered daily and published on thousands of internet information sources.
Vigil@nce describes these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
Your team secures and protects your networks based on Vigil@nce information and tools.

Your environment

  • A database describing more than 25000 vulnerabilities and their 40000 solutions.
  • A web space where each user defines his preferences.
  • Alert and synthesis e-mails, to inform your teams.
  • A customized tracking of your software and systems.
  • A diary to plan solutions to install, and to monitor the security process of each computer.
  • A manager view, and customized reports.

Your benefits

  • A customized watch on computer vulnerabilities and their solutions.
  • An experienced team at your service for more than 17 years.
  • A tool to monitor the security process of your networks and computers.
  • A CVE compatible solution.
  • A time saving for your team which concentrates on important tasks.