Orange Business Services
Vigil@nce Vigil@nce Vigil@nce
we track for your security since 1999
 home presentation vulnerabilities documentation contact  
subscriber area subscriber area
free access free access

The Vigil@nce team watches vulnerabilities impacting your computers, and then offers solutions, a database and tools to correct them.

Each user customizes the list of software to track.

As soon as Vigil@nce publishes an alert for one of his software, the user receives a bulletin, containing an helpful explanation of the threat, its patches and workarounds.

The administrator then uses the online Vigil@nce diary in order to plan and track the security process.

Our offer...
public vulnerabilities
3 Internet Explorer: use after free in VGX.DLL
An attacker can use a freed memory area in VGX.DLL of Internet Explorer, in order to trigger a denial of service, and possibly to execute code...
1 Linux kernel: use after free via VFS Symlink
An attacker can use a freed memory area in VFS via a Symlink, in order to trigger a denial of service in the Linux kernel, and possibly to execute code...
2 SSL: revocation of CCA
The Government of India Controller of Certifying Authorities certification authority emitted certificates to spoof several Google domains...
2 WordPress Polldaddy Polls and Ratings: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Polldaddy Polls and Ratings, in order to execute JavaScript code in the context of the web site...
2 Cisco ASA: infinite loop of Filter Inspect
When the Filter and Inspect features are enabled, an attacker can generate an infinite loop in Cisco ASA, in order to trigger a denial of service...
2 Cisco Unified Communications Manager: directory traversal of RTMT
An attacker can traverse directories in RTMT of Cisco Unified Communications Manager, in order to read a file outside the service root path...
2 Citrix XenDesktop: privilege escalation via Pooled Random Desktop Groups
An attacker can use a Pooled Random Desktop Group of Citrix XenDesktop, in order to escalate his privileges...
2 Cisco Unified Communications Manager: Cross Site Scripting of DNA viewfilecontents.do
An attacker can trigger a Cross Site Scripting in DNA viewfilecontents.do of Cisco Unified Communications Manager, in order to execute JavaScript code in the context of the web site...
2 Cisco Unified Communications Manager: file upload via DNA
An attacker can upload a malicious file via DNA on Cisco Unified Communications Manager, in order for example to upload a Trojan...
2 Cisco Unified Communications Manager: denial of service via DNA
An attacker can delete files via DNA of Cisco Unified Communications Manager, in order to trigger a denial of service...
   recent vulnerabilities
1 rsync: file not synchronized via MD5 collisions
A local attacker can trigger MD5 collisions in rsync, in order to prevent file synchronization...
2 WordPress My Calendar: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress My Calendar, in order to execute JavaScript code in the context of the web site...
2 McAfee Network Security Manager: Cross Site Request Forgery of User Management
An attacker can trigger a Cross Site Request Forgery in User Management of McAfee Network Security Manager, in order to change user accounts...
2 Cacti: Cross Site Scripting of utilities.php
An attacker can trigger a Cross Site Scripting in utilities.php of Cacti, in order to execute JavaScript code in the context of the web site...
2 Linux kernel: NULL pointer dereference via sctp_assoc_update
An attacker can dereference a NULL pointer in sctp_assoc_update of the Linux kernel, in order to trigger a denial of service...
2 PHP: use after free via SPL Iterators
A local attacker can use a freed memory area in SPL Iterators of PHP, in order to trigger a denial of service, and possibly to execute code...
2 SIMATIC WinCC: multiple vulnerabilities
An attacker can use several vulnerabilities of SIMATIC WinCC...
3 Apple QuickTime: memory corruption via MVHD
An attacker can generate a memory corruption via MVHD fields of an Apple QuickTime file, in order to trigger a denial of service, and possibly to execute code...
3 HP Data Protector: multiple vulnerabilities of crs.exe
An attacker can use several vulnerabilities of crs.exe of HP Data Protector...
1 Linux kernel: use after free via VFS Symlink
An attacker can use a freed memory area in VFS via a Symlink, in order to trigger a denial of service in the Linux kernel, and possibly to execute code...


Vulnerabilities are discovered daily and published on thousands of internet information sources.
Vigil@nce describes these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
Your team secures and protects your networks based on Vigil@nce information and tools.

your environment

  • a database describing more than 20000 vulnerabilities and their 30000 solutions
  • a web space where each user defines his preferences
  • alert and synthesis e-mails, to inform your teams
  • a customized tracking of your software and systems
  • a diary to plan solutions to install, and to monitor the security process of each computer
  • a manager view, and customized reports

your benefits

  • a customized watch on computer vulnerabilities and their solutions
  • an experienced team at your service for more than 14 years
  • a tool to monitor the security process of your networks and computers
  • a CVE compatible solution
  • a time saving for your team which concentrates on important tasks



















Copyright 1999-2014 Vigil@nce. Vigil@nce is a service from Orange Business Services. Site map. Legal notice. Version française