The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Each user customizes the list of software to track.

As soon as Vigil@nce publishes an alert for one of his software, the user receives a bulletin, containing an helpful explanation of the threat, its patches and workarounds.

The administrator then uses the online Vigil@nce diary in order to plan and track the security process.

Our offer...
public vulnerabilities
1 WordPress Download Manager: open redirect
2 Joomla VideoFlow: SQL injection
2 WordPress surveys: three SQL injections
2 WordPress eventr: two SQL injections
2 WordPress Newsletter by Supsystic: Cross Site Scripting
2 Asterisk Open Source: three vulnerabilities
2 Red Hat JBoss EAP: external XML entity injection via javax.xml.transform.TransformerFactory
2 VMware Workstation: two vulnerabilities
3 Oracle Java: vulnerabilities of October 2016
2 FortiOS: Cross Site Scripting via Policy Global-label Parameter
2 Cisco Unified Communications Manager: Cross Site Scripting
2 Cisco IP Phone 8851: denial of service via SIP CANCEL
2 Joomla Core: SQL injection
2 WordPress Adsense Click Fraud Monitoring: Cross Site Scripting
3 Oracle MySQL: vulnerabilities of October 2016
  
recent vulnerabilities
2 Joomla Core: two vulnerabilities
2 WordPress Ultimate Affiliate Pro: Cross Site Scripting
2 WordPress FormCraft Premium: Cross Site Scripting
2 WordPress YouTube EmbedPlus: Cross Site Request Forgery
2 WordPress IBPS Online Exam Plugin: Cross Site Scripting
2 Linux kernel: buffer overflow via brcmf_cfg80211_mgmt_tx
2 WordPress Simple Custom CSS and JS: Cross Site Scripting
2 WordPress Popup Maker: Cross Site Scripting
2 WordPress Arabic Font: Cross Site Request Forgery
2 WordPress Task Manager: Cross Site Scripting
2 Cacti: Cross Site Scripting via auth_profile.php
2 PAN-OS: Cross Site Scripting via GlobalProtect
2 PAN-OS: Cross Site Scripting
2 pfSense: Cross Site Scripting via WebGUI
2 Joomla JoomRecipe: SQL injection


Vulnerabilities are discovered daily and published on thousands of internet information sources.
Vigil@nce describes these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
Your team secures and protects your networks based on Vigil@nce information and tools.

Your environment

  • A database describing more than 25000 vulnerabilities and their 40000 solutions.
  • A web space where each user defines his preferences.
  • Alert and synthesis e-mails, to inform your teams.
  • A customized tracking of your software and systems.
  • A diary to plan solutions to install, and to monitor the security process of each computer.
  • A manager view, and customized reports.

Your benefits

  • A customized watch on computer vulnerabilities and their solutions.
  • An experienced team at your service for more than 18 years.
  • A tool to monitor the security process of your networks and computers.
  • A CVE compatible solution.
  • A time saving for your team which concentrates on important tasks.