The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Each user customizes the list of software to track.

As soon as Vigil@nce publishes an alert for one of his software, the user receives a bulletin, containing an helpful explanation of the threat, its patches and workarounds.

The administrator then uses the online Vigil@nce diary in order to plan and track the security process.

Our offer...
public vulnerabilities
2 WordPress WP Custom Fields Search: Cross Site Scripting
2 WordPress Download Manager: Cross Site Scripting
2 WordPress WP Job Manager: Cross Site Scripting
2 Trend Micro Internet Security: privilege escalation via ioctl
2 Fortinet FortiOS: Cross Site Scripting via comments
2 Wireshark: two vulnerabilities
2 RabbitMQ: two vulnerabilities
2 WordPress Event List: SQL injection
2 WordPress WP Jobs: SQL injection via the parameter jobid
2 libsndfile: out-of-bounds memory reading via aiff_read_chanmap
2 WordPress WP-Testimonials: SQL injection via the testid request parameter
2 QEMU: denial of service against the Network Block Device server
3 Chrome: four vulnerabilities
2 Cisco AnyConnect Secure Mobility Client: executing DLL code
2 QEMU: memory leak via the EHCI emulation
  
recent vulnerabilities
3 Joomla com_weblinks: file upload
2 WordPress Share on Diaspora: Cross Site Scripting
2 Joomla com_jumi: SQL injection
2 Cacti: Cross Site Scripting via spikekill.php
3 Drupal Core: three vulnerabilities
2 Cisco AnyConnect Secure Mobility Client: Cross Site Scripting
2 Cisco Prime Infrastructure: Cross Site Scripting
2 Fossil: Cross Site Scripting
2 Splunk Enterprise: Cross Site Scripting
2 WordPress Gallery Transformation: SQL injection
2 WordPress RK Responsive Contact Form: SQL injection
2 WordPress Link Library: SQL injection
2 WordPress I Recommend This: SQL injection
2 WordPress FAdvertisement: SQL injection
2 IBM WebSphere AS: information disclosure via Admin Console Cipher Suites


Vulnerabilities are discovered daily and published on thousands of internet information sources.
Vigil@nce describes these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
Your team secures and protects your networks based on Vigil@nce information and tools.

Your environment

  • A database describing more than 25000 vulnerabilities and their 40000 solutions.
  • A web space where each user defines his preferences.
  • Alert and synthesis e-mails, to inform your teams.
  • A customized tracking of your software and systems.
  • A diary to plan solutions to install, and to monitor the security process of each computer.
  • A manager view, and customized reports.

Your benefits

  • A customized watch on computer vulnerabilities and their solutions.
  • An experienced team at your service for more than 18 years.
  • A tool to monitor the security process of your networks and computers.
  • A CVE compatible solution.
  • A time saving for your team which concentrates on important tasks.