The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Each user customizes the list of software to track.

As soon as Vigil@nce publishes an alert for one of his software, the user receives a bulletin, containing an helpful explanation of the threat, its patches and workarounds.

The administrator then uses the online Vigil@nce diary in order to plan and track the security process.

Our offer...
public vulnerabilities
3 libupnp: file creation via POST
2 PuTTY: two vulnerabilities
2 Splunk Enterprise: Cross Site Scripting via Splunk Web
2 WordPress Democracy Poll: Cross Site Scripting
2 Synology DSM: two vulnerabilities
2 Drupal Timezone Detect: Cross Site Request Forgery
2 WordPress ByREV WP-PICShield: Cross Site Request Forgery
2 WordPress Rockhoist Badges: Cross Site Scripting via rh-badges.php
2 Palo Alto PAN-OS: directory traversal via the magament Web interface
2 Palo Alto PAN-OS: Cross Site Scripting via the management interface
2 WordPress Mail-Masta: SQL injection
2 curl: Man-in-the-Middle with SSL_VERIFYSTATUS
2 JGroups: two vulnerabilities
2 pfSense: multiple Cross Site Scripting in the captive portal
2 IBM WebSphere MQ: multiple vulnerabilities
recent vulnerabilities
2 Linux kernel: NULL pointer dereference via the machine instruction INVEPT
2 WordPress Easy WP SMTP: Cross Site Scripting via Email
2 WordPress Newsletter: SQL injection
2 WordPress Flagallery Photo Portfolio: SQL injection
2 libcroco: two vulnerabilities
2 Palo Alto PAN-OS: Cross Site Scripting via GlobalProtect External Interface
2 WordPress Connection Information: Cross Site Request Forgery
1 Ghostscript: two vulnerabilities
2 WordPress Booking Calendar: Cross Site Scripting
2 WordPress Ultimate Form Builder Lite: Cross Site Scripting
2 WordPress AccessPress Social Icons: Cross Site Scripting
2 Splunk Enterprise: three Cross Site Scripting via Splunk Web
2 SafeNet Authentication Manager: privilege escalation via an ActiveX component of the client package
2 Cisco Prime Infrastructure: Cross Site Scripting via Web Framework
2 Cisco ASA: denial of service via TCP

Vulnerabilities are discovered daily and published on thousands of internet information sources.
Vigil@nce describes these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
Your team secures and protects your networks based on Vigil@nce information and tools.

Your environment

  • A database describing more than 25000 vulnerabilities and their 40000 solutions.
  • A web space where each user defines his preferences.
  • Alert and synthesis e-mails, to inform your teams.
  • A customized tracking of your software and systems.
  • A diary to plan solutions to install, and to monitor the security process of each computer.
  • A manager view, and customized reports.

Your benefits

  • A customized watch on computer vulnerabilities and their solutions.
  • An experienced team at your service for more than 18 years.
  • A tool to monitor the security process of your networks and computers.
  • A CVE compatible solution.
  • A time saving for your team which concentrates on important tasks.