The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Each user customizes the list of software to track.

As soon as Vigil@nce publishes an alert for one of his software, the user receives a bulletin, containing an helpful explanation of the threat, its patches and workarounds.

The administrator then uses the online Vigil@nce diary in order to plan and track the security process.

Our offer...
public vulnerabilities
2 Usermin: Cross Site Scripting
2 Trend Micro InterScan Messaging Security Virtual Appliance: three vulnerabilities
2 Trend Micro OfficeScan: directory traversal
2 Symantec Web Gateway: privilege escalation via Management Console
2 FortiAnalyzer, FortiManager: Cross Site Scripting via Report Filters
2 F5 BIG-IP: Cross Site Scripting via BIGIPAuthUsernameCookie
2 Cisco NX-OS: denial of service via BGP
2 Cisco NX-OS: denial of service via DHCPv4
2 Cisco NX-OS: denial of service via DHCPv4
2 Cisco IOS, IOS XE: denial of service via IKEv2
2 Dotclear: spoofing of password reset page
2 Joomla Shape 5 MP3 Player: directory traversal
2 PAN-OS: information disclosure via GlobalProtect Portal
2 Wireshark: two vulnerabilities
2 X.Org: multiple vulnerabilities
recent vulnerabilities
2 SIMATIC WinCC, PCS 7: out-of-bounds memory reading via ActiveX
2 SIMATIC S7: two vulnerabilities
2 WordPress Social Share Buttons Social Pug: Cross Site Scripting
2 WordPress Multisite Post Duplicator: Cross Site Request Forgery
2 PHP: multiple vulnerabilities
2 Cisco IOS XR: denial of service via HTTP 2.0
2 Cisco Email Security Appliance: Cross Site Scripting
2 Cisco Unified Communications Manager: Cross Site Scripting via Administration Page
2 Cisco ASR 5000: denial of service via IKEv2
2 Drupal High-performance JavaScript callback handler: two vulnerabilities
2 Joomla JS Jobs: SQL injection
2 WebSphere AS: Cross Site Scripting via Admin Console
2 WordPress WA Form Builder: SQL injection
2 WordPress Product Catalog: SQL injection
2 WordPress BBS e-Franchise: SQL injection

Vulnerabilities are discovered daily and published on thousands of internet information sources.
Vigil@nce describes these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
Your team secures and protects your networks based on Vigil@nce information and tools.

Your environment

  • A database describing more than 25000 vulnerabilities and their 40000 solutions.
  • A web space where each user defines his preferences.
  • Alert and synthesis e-mails, to inform your teams.
  • A customized tracking of your software and systems.
  • A diary to plan solutions to install, and to monitor the security process of each computer.
  • A manager view, and customized reports.

Your benefits

  • A customized watch on computer vulnerabilities and their solutions.
  • An experienced team at your service for more than 17 years.
  • A tool to monitor the security process of your networks and computers.
  • A CVE compatible solution.
  • A time saving for your team which concentrates on important tasks.