Orange Business Services
Vigil@nce Vigil@nce Vigil@nce
we track for your security since 1999
 home presentation vulnerabilities documentation contact  
subscriber area subscriber area
free access free access

The Vigil@nce team watches vulnerabilities impacting your computers, and then offers solutions, a database and tools to correct them.

Each user customizes the list of software to track.

As soon as Vigil@nce publishes an alert for one of his software, the user receives a bulletin, containing an helpful explanation of the threat, its patches and workarounds.

The administrator then uses the online Vigil@nce diary in order to plan and track the security process.

Our offer...
public vulnerabilities
2 WordPress BSK PDF Manager: SQL injection
An attacker can use a SQL injection of WordPress BSK PDF Manager, in order to read or alter data...
2 Cisco Small Business SPA300/500 IP Phones: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Small Business SPA300/500 IP Phones, in order to execute JavaScript code in the context of the web site...
2 Cisco Small Business SPA300/500 IP Phones: privilege escalation
A local attacker can access to the debug interface of Cisco Small Business SPA300/500 IP Phones, in order to escalate his privileges...
2 Cisco IOS, IOS XE: bypassing NTP access-group
An attacker can bypass NTP access-group of Cisco IOS or IOS XE, in order to access to the NTP service...
1 syslog-ng: memory leak
An attacker can create a memory leak of syslog-ng, in order to trigger a denial of service...
2 Microsoft Service Bus: denial of service via AMQP
An attacker can send AMQP messages to Microsoft Service Bus for Windows Server, in order to trigger a denial of service...
2 Windows: privilege escalation via DirectShow
A local attacker can use DirectShow of Windows, in order to escalate his privileges...
2 Windows: privilege elevation via AFD
A local attacker can create an error in Ancillary Function Driver in order to execute code with system privileges...
2 Windows: privilege escalation via On-Screen Keyboard
A local attacker can use the On-Screen Keyboard of Windows, in order to escalate his privileges...
2 Adobe Flash Player: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Flash Player...
   recent vulnerabilities
2 Linux kernel: NULL pointer dereference via sctp_assoc_update
An attacker can dereference a NULL pointer in sctp_assoc_update of the Linux kernel, in order to trigger a denial of service...
2 PHP: use after free via SPL Iterators
A local attacker can use a freed memory area in SPL Iterators of PHP, in order to trigger a denial of service, and possibly to execute code...
2 SIMATIC WinCC: multiple vulnerabilities
An attacker can use several vulnerabilities of SIMATIC WinCC...
3 Apple QuickTime: memory corruption via MVHD
An attacker can generate a memory corruption via MVHD fields of an Apple QuickTime file, in order to trigger a denial of service, and possibly to execute code...
3 HP Data Protector: multiple vulnerabilities of crs.exe
An attacker can use several vulnerabilities of crs.exe of HP Data Protector...
1 Linux kernel: use after free via VFS Symlink
An attacker can use a freed memory area in VFS via a Symlink, in order to trigger a denial of service in the Linux kernel, and possibly to execute code...
2 Drupal Freelinking: information disclosure
An attacker can use Drupal Freelinking, in order to obtain sensitive information...
3 Cisco IOS XR: denial of service via NetFlow
An attacker can send IPv4 or IPv6 ill formed packets to NetFlow of Cisco IOS XR, in order to trigger a denial of service...
3 Apache httpd: NULL pointer dereference via mod_cache
An attacker can dereference a NULL pointer in mod_cache of Apache httpd, in order to trigger a denial of service...
2 WordPress DW Question and Answer: read-write access
An attacker can bypass access restrictions of WordPress DW Question and Answer, in order to read or alter data...


Vulnerabilities are discovered daily and published on thousands of internet information sources.
Vigil@nce describes these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
Your team secures and protects your networks based on Vigil@nce information and tools.

your environment

  • a database describing more than 20000 vulnerabilities and their 30000 solutions
  • a web space where each user defines his preferences
  • alert and synthesis e-mails, to inform your teams
  • a customized tracking of your software and systems
  • a diary to plan solutions to install, and to monitor the security process of each computer
  • a manager view, and customized reports

your benefits

  • a customized watch on computer vulnerabilities and their solutions
  • an experienced team at your service for more than 14 years
  • a tool to monitor the security process of your networks and computers
  • a CVE compatible solution
  • a time saving for your team which concentrates on important tasks



















Copyright 1999-2014 Vigil@nce. Vigil@nce is a service from Orange Business Services. Site map. Legal notice. Version française