The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Each user customizes the list of software to track.

As soon as Vigil@nce publishes an alert for one of his software, the user receives a bulletin, containing an helpful explanation of the threat, its patches and workarounds.

The administrator then uses the online Vigil@nce diary in order to plan and track the security process.

Our offer...
public vulnerabilities
2 Quagga Routing Suite: denial of service via telnet
2 Tenable Nessus: Cross Site Scripting
2 Wireshark: two vulnerabilities
2 phpMyAdmin: seven vulnerabilities
3 PHP 5: multiple vulnerabilities
1 Wireshark: nine vulnerabilities
2 Linux kernel: access to protected memory area under KVM
2 Ganglia Web: Cross Site Scripting via the metrics API
2 Cisco ASR 5000: denial of service via IKE
2 Cisco Catalyst: denial of service via IPv6 Neighbor Discovery
2 Cisco Unified Communications Manager: Cross Site Scripting
2 Cisco Unified Communications Manager: Cross Site Scripting
2 Cisco Nexus: denial of service via IS-IS
2 Samba: privilege escalation via DENY rules for file access
2 Zope 2: two vulnerabilities
  
recent vulnerabilities
2 Synology Photo Station: Cross Site Scripting
2 Joomla FocalPoint: SQL injection
2 Joomla Modern Booking: SQL injection
2 WordPress YOP Poll: Cross Site Scripting
2 Joomla Eshop, Events Booking, Membership Pro: invalid payment via Paypal Payment
3 Trend Micro InterScan Messaging Security Suite: information disclosure via admin
3 Synology: code execution via PHP objects for Moodle
2 Drupal Office Hours: Cross Site Scripting
2 Tenable Nessus: privilege escalation via the Agent Mode
2 PuTTY: two vulnerabilities
4 Windows: vulnerabilities of March 2017
4 Internet Explorer: vulnerabilities of March 2017
4 Adobe Flash Player: multiple vulnerabilities
4 Microsoft Edge: vulnerabilities of March 2017
2 NTP.org: multiple vulnerabilities


Vulnerabilities are discovered daily and published on thousands of internet information sources.
Vigil@nce describes these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
Your team secures and protects your networks based on Vigil@nce information and tools.

Your environment

  • A database describing more than 25000 vulnerabilities and their 40000 solutions.
  • A web space where each user defines his preferences.
  • Alert and synthesis e-mails, to inform your teams.
  • A customized tracking of your software and systems.
  • A diary to plan solutions to install, and to monitor the security process of each computer.
  • A manager view, and customized reports.

Your benefits

  • A customized watch on computer vulnerabilities and their solutions.
  • An experienced team at your service for more than 18 years.
  • A tool to monitor the security process of your networks and computers.
  • A CVE compatible solution.
  • A time saving for your team which concentrates on important tasks.