Orange Applications for Business
Vigil@nce Vigil@nce Vigil@nce
analyzing computer vulnerabilities since 1999
 home presentation vulnerabilities documentation contact  
subscriber area subscriber area
free trial free trial



The Vigil@nce team watches vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Each user customizes the list of software to track.

As soon as Vigil@nce publishes an alert for one of his software, the user receives a bulletin, containing an helpful explanation of the threat, its patches and workarounds.

The administrator then uses the online Vigil@nce diary in order to plan and track the security process.

Our offer...
public vulnerabilities
2 libXfont: three vulnerabilities of BDF
An attacker can use several vulnerabilities of BDF of libXfont...
2 WordPress Pods: SQL injection
An attacker can use a SQL injection of WordPress Pods, in order to read or alter data...
2 WordPress MiwoFTP: file reading
An attacker can read a file of WordPress MiwoFTP, in order to obtain sensitive information...
2 WordPress Gravity Forms: SQL injection
An attacker can use a SQL injection of WordPress Gravity Forms, in order to read or alter data...
2 Linux kernel: privilege escalation via XFS Attribute
A local attacker can manipulate XFS attributes on the Linux kernel, in order to trigger a denial of service or to escalate his privileges...
2 WordPress Custom Field Suite: read-write access
An attacker can bypass access restrictions of WordPress Custom Field Suite, in order to read or alter data...
2 WordPress WooCommerce: SQL injection
An attacker can use a SQL injection of WordPress WooCommerce, in order to read or alter data...
2 OpenSSL: memory leak via hostname
An attacker can create a memory leak in the hostname extension of OpenSSL, in order to trigger a denial of service...
2 WordPress IP Blacklist Cloud: directory traversal
An attacker can traverse directories of WordPress IP Blacklist Cloud, in order to read a file outside the service root path...
2 WordPress WPML: three vulnerabilities
An attacker can use several vulnerabilities of WordPress WPML...
   recent vulnerabilities
2 Cisco Prime Data Center Network Manager: directory traversal
An attacker can traverse directories of Cisco Prime Data Center Network Manager, in order to read a file outside the service root path...
3 Cisco Unity Connection: five vulnerabilities
An attacker can use several vulnerabilities of Cisco Unity Connection...
2 EMC PowerPath Virtual Appliance: undocumented accounts
An attacker can log in on two accounts created by EMC PowerPath Virtual Appliance, which can be used to obtain information about the system...
2 WordPress Favicon by RealFaviconGenerator: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Favicon by RealFaviconGenerator, in order to execute JavaScript code in the context of the web site...
2 Cisco ASR 1000 Series: denial of service via Route Adjacencies
An attacker can send a malicious IP packet to Cisco ASR 1000 Series, in order to trigger a denial of service...
2 WordPress Ptengine: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Ptengine, in order to execute JavaScript code in the context of the web site...
2 WordPress WP Business Intelligence: SQL injection
An attacker can use a SQL injection of WordPress Business Intelligence, in order to read or alter data...
2 WordPress flashy: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress flashy, in order to execute JavaScript code in the context of the web site...
2 mDNS: information disclosure and DDos
An attacker can query the mDNS service, in order to obtain sensitive information about the network, or to amplify a denial of service attack...
3 WordPress VideoWhisper Video Conference Integration: file upload
An attacker can upload a malicious file on WordPress VideoWhisper Video Conference Integration, in order for example to upload a Trojan...


Vulnerabilities are discovered daily and published on thousands of internet information sources.
Vigil@nce describes these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
Your team secures and protects your networks based on Vigil@nce information and tools.

your environment

  • a database describing more than 20000 vulnerabilities and their 35000 solutions
  • a web space where each user defines his preferences
  • alert and synthesis e-mails, to inform your teams
  • a customized tracking of your software and systems
  • a diary to plan solutions to install, and to monitor the security process of each computer
  • a manager view, and customized reports

your benefits

  • a customized watch on computer vulnerabilities and their solutions
  • an experienced team at your service for more than 16 years
  • a tool to monitor the security process of your networks and computers
  • a CVE compatible solution
  • a time saving for your team which concentrates on important tasks



















Copyright 1999-2015 Vigil@nce. Vigil@nce is a service from Orange Applications for Business. Site map. Legal notice. version française