Orange Business Services
Vigil@nce Vigil@nce Vigil@nce
we track for your security since 1999
 home presentation vulnerabilities documentation contact  
subscriber area subscriber area
free access free access

The Vigil@nce team watches vulnerabilities impacting your computers, and then offers solutions, a database and tools to correct them.

Each user customizes the list of software to track.

As soon as Vigil@nce publishes an alert for one of his software, the user receives a bulletin, containing an helpful explanation of the threat, its patches and workarounds.

The administrator then uses the online Vigil@nce diary in order to plan and track the security process.

Our offer...
public vulnerabilities
2 Apache Subversion: wrong validation of SSL certificate
An attacker can use a certificate with wildcard to spoof a Subversion server...
3 Apache Tomcat: injecting HTTP headers
An attacker can use a special HTTP Content-Length header, in order to desynchronize Apache Tomcat and its proxy, to bypass security features...
3 Apache Tomcat: denial of service via Chunked
An attacker can send an HTTP Chunked header to Apache Tomcat, in order to trigger a denial of service...
2 MIT krb5: NULL pointer dereference via GSSAPI
An attacker can force a NULL pointer to be dereferenced in the server process Kerberos, in order to trigger a denial of service...
3 Check Point Security Gateway: denial of service
An attacker can send malicious packets to Check Point Security Gateway, in order to trigger a denial of service...
2 Cisco Unified Communications Manager: SQL injection of Unity Connection
An attacker can use a SQL injection in Unity Connection of Cisco Unified Communications Manager, in order to read data...
3 Apache Struts 1: code execution via ClassLoader
An attacker can use the "class" parameter, to manipulate the ClassLoader, in order to execute code...
3 Apache Struts 2: multiple vulnerabilities
An attacker can use several vulnerabilities of Apache Struts 2...
1 Akeeba Backup for WordPress and Joomla: information disclosure
An attacker can send many requests of backups access to Akeeba Backup, in order to retrieve the authentication secret...
2 Joomla Watchful Client: information disclosure
An attacker can make Joomla Watchful Client call code stored outside of the product installation tree, in order to obtain sensitive information...
   recent vulnerabilities
1 NetBSD: denial of service via modctl
A local attacker can use modctl of NetBSD, in order to trigger a denial of service...
1 NetBSD: multiple vulnerabilities of COMPAT_
An attacker can use several vulnerabilities of COMPAT_ of NetBSD...
2 NetBSD: multiple vulnerabilities of execve
An attacker can use several vulnerabilities of execve of NetBSD...
2 Joomla Spider: SQL injection
An attacker can use a SQL injection of Joomla Spider, in order to read or alter data...
2 WordPress MailPoet Newsletters: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress MailPoet Newsletters, in order to force the victim to perform operations...
1 QEMU: denial of service via vmstate_xhci_event
A local attacker can use vmstate_xhci_event of QEMU, in order to trigger a denial of service...
1 Apache Subversion: information disclosure via MD5 Cache
A local attacker can trigger a MD5 collision in the cache of Apache Subversion, in order to obtain sensitive information...
1 Linux kernel: denial of service via ISOFS
A local attacker can mount a malicious ISOFS image on the Linux kernel, in order to trigger a denial of service...
1 glibc: buffer overflow of __gconv_translit_find
An attacker can generate a buffer overflow in the __gconv_translit_find() function of the glibc, in order to trigger a denial of service, and possibly to execute code...
1 IPv6: denial of service via Filtered Extension Headers
An attacker can send a spoofed ICMPv6 packet to an IPv6 implementation filtering extension headers, in order to trigger a denial of service...


Vulnerabilities are discovered daily and published on thousands of internet information sources.
Vigil@nce describes these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
Your team secures and protects your networks based on Vigil@nce information and tools.

your environment

  • a database describing more than 20000 vulnerabilities and their 35000 solutions
  • a web space where each user defines his preferences
  • alert and synthesis e-mails, to inform your teams
  • a customized tracking of your software and systems
  • a diary to plan solutions to install, and to monitor the security process of each computer
  • a manager view, and customized reports

your benefits

  • a customized watch on computer vulnerabilities and their solutions
  • an experienced team at your service for more than 14 years
  • a tool to monitor the security process of your networks and computers
  • a CVE compatible solution
  • a time saving for your team which concentrates on important tasks



















Copyright 1999-2014 Vigil@nce. Vigil@nce is a service from Orange Business Services. Site map. Legal notice. Version française