Orange Business Services
Vigil@nce Vigil@nce Vigil@nce
analyzing computer vulnerabilities since 1999
 home presentation vulnerabilities documentation contact  
subscriber area subscriber area
free access free access

The Vigil@nce team watches vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Each user customizes the list of software to track.

As soon as Vigil@nce publishes an alert for one of his software, the user receives a bulletin, containing an helpful explanation of the threat, its patches and workarounds.

The administrator then uses the online Vigil@nce diary in order to plan and track the security process.

Our offer...
public vulnerabilities
1 OpenSSL: option no-ssl3 useless
An attacker can still use SSLv3, even if OpenSSL was compiled with no-ssl3...
2 Internet Explorer: use after free via Script Debugging
An attacker can force the usage of a freed memory area in Script Debugging of Internet Explorer, in order to trigger a denial of service, and possibly to execute code...
2 RSYSLOG: integer overflow of PRI
An attacker can generate an integer overflow via PRI in RSYSLOG, in order to trigger a denial of service, and possibly to execute code...
3 Apache httpd: denial of service via mod_proxy
An attacker can send a malicious query to mod_proxy of Apache httpd, in order to trigger a denial of service...
1 Linux kernel: denial of service via xfs_da3_fixhashpath
A local attacker can manipulate directories on an XFS filesystem with the Linux kernel, in order to trigger a denial of service...
2 phpMyAdmin: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of phpMyAdmin, in order to execute JavaScript code in the context of the web site...
2 Linux kernel: predictability of net_get_random_once
An attacker can predict randoms of features using the net_get_random_once() function of the Linux kernel, in order to spoof a network session...
2 WordPress Content Audit: SQL injection
An attacker can use a SQL injection of WordPress Content Audit, in order to read or alter data...
2 Splunk Enterprise: multiple vulnerabilities
An attacker can use several vulnerabilities of Splunk Enterprise...
2 Joomla: denial of service
An attacker can use Joomla, in order to trigger a denial of service...
   recent vulnerabilities
2 IBM Directory Server: Cross Site Scripting of Admin UI
An attacker can trigger a Cross Site Scripting in Admin UI of IBM Directory Server, in order to execute JavaScript code in the context of the web site...
3 Centreon: multiple vulnerabilities
An attacker can use several vulnerabilities of Centreon...
1 OpenBSD: denial of service via unaligned memory access
A local attacker can used an OpenBSD program using unaligned addresses, in order to trigger a denial of service...
2 TYPO3 Dynamic Content Elements: information disclosure
An attacker can use TYPO3 Dynamic Content Elements, in order to obtain sensitive information...
2 TYPO3 fal_sftp: file reading
An attacker can read a file of TYPO3 fal_sftp, in order to obtain sensitive information...
1 F5 BIG-IP: code execution via iControl
An attacker, authenticated as administrator, can use iControl of F5 BIG-IP, in order to execute shell code...
2 TYPO3 Calendar Base: denial of service via PCRE
An attacker can use a complex PCRE expression with TYPO3 Calendar Base, in order to trigger a denial of service...
2 WordPress Database Manager: SQL injection
An attacker can use a SQL injection of WordPress Database Manager, in order to read or alter data...
3 PHP: multiple vulnerabilities
An attacker can use several vulnerabilities of PHP...
2 libxml2: infinite loop via entities
An attacker can create malformed XML data, in order to generate a denial of service in applications linked to libxml2...


Vulnerabilities are discovered daily and published on thousands of internet information sources.
Vigil@nce describes these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
Your team secures and protects your networks based on Vigil@nce information and tools.

your environment

  • a database describing more than 20000 vulnerabilities and their 35000 solutions
  • a web space where each user defines his preferences
  • alert and synthesis e-mails, to inform your teams
  • a customized tracking of your software and systems
  • a diary to plan solutions to install, and to monitor the security process of each computer
  • a manager view, and customized reports

your benefits

  • a customized watch on computer vulnerabilities and their solutions
  • an experienced team at your service for more than 14 years
  • a tool to monitor the security process of your networks and computers
  • a CVE compatible solution
  • a time saving for your team which concentrates on important tasks



















Copyright 1999-2014 Vigil@nce. Vigil@nce is a service from Orange Business Services. Site map. Legal notice. Version française