The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Each user customizes the list of software to track.

As soon as Vigil@nce publishes an alert for one of his software, the user receives a bulletin, containing a simple explanation of the threat, its patches and workarounds.

The administrator then uses the online Vigil@nce diary in order to plan and track the security process.

Our offer...
public vulnerabilities
2 Joomla Realpin: SQL injection
2 WordPress Quizlord: Cross Site Scripting
2 WordPress Jibu Pro: Cross Site Scripting
2 WordPress File Manager: Cross Site Scripting via Storage
2 WordPress UserPro: Cross Site Scripting
2 Drupal Fraction: Cross Site Scripting
2 Cisco Prime Collaboration Assurance: Cross Site Scripting
2 Cisco Secure Access Control Server: external XML entity injection
2 WordPress Gift Voucher: SQL injection
2 SquirrelMail: Cross Site Scripting
2 Drupal Bing Autosuggest API: Cross Site Scripting
2 Bootstrap: Cross Site Scripting via Collapse
2 NextCloud: Cross Site Scripting via Autocomplete Field
2 Apache AXIS: Cross Site Scripting
2 Ansible Tower: Cross Site Request Forgery via awx/api/
recent vulnerabilities
2 Joomla Jimtawl: SQL injection
2 WordPress Ninja Forms: Cross Site Scripting
2 Centreon: Cross Site Scripting via Adding Poller Macros
2 Centreon: SQL injection via searchH
2 WebSphere AS: Cross Site Scripting via Installation Verification Tool
2 WordPress PeepSo: Cross Site Scripting
2 PostgreSQL: SQL injection via pg_upgrade/pg_dump
2 OTRS Help Desk: Cross Site Scripting via Admin User
1 OTRS Help Desk: Cross Site Scripting via Admin User
2 WebSphere AS: Cross Site Scripting via SIBMsgMigration Utility
2 PHP PEAR: Cross Site Scripting via Proxy Mode
2 Node.js m-server: Cross Site Scripting
2 Node.js express-cart: SQL injection
2 Cisco Content Security Management Appliance: Cross Site Scripting
2 Roundcube Webmail: Cross Site Scripting

Vulnerabilities are discovered daily and published on thousands of internet information sources.
Vigil@nce announces these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
Your team secures and protects your networks based on Vigil@nce information and tools.

Your environment

  • A database describing more than 25000 vulnerabilities and their 60000 solutions.
  • A web space where each user defines his preferences.
  • Alert and synthesis e-mails, to inform your teams.
  • A customized tracking of your software and systems.
  • A diary to plan solutions to install, and to monitor the security process of each computer.
  • A manager view, and customized reports.

Your benefits

  • A customized watch on computer vulnerabilities and their solutions.
  • An experienced team at your service for more than 19 years.
  • A tool to monitor the security process of your networks and computers.
  • A CVE compatible solution.
  • A time saving for your team which concentrates on important tasks.