Orange Business Services
Vigil@nce Vigil@nce Vigil@nce
we track for your security since 1999
 home presentation vulnerabilities documentation contact  
subscriber area subscriber area
free access free access

The Vigil@nce team watches vulnerabilities impacting your computers, and then offers solutions, a database and tools to correct them.

Each user customizes the list of software to track.

As soon as Vigil@nce publishes an alert for one of his software, the user receives a bulletin, containing an helpful explanation of the threat, its patches and workarounds.

The administrator then uses the online Vigil@nce diary in order to plan and track the security process.

Our offer...
public vulnerabilities
2 Apache httpd: memory leak via WinNT MPM
An attacker can create a memory leak in WinNT MPM of Apache httpd, in order to trigger a denial of service...
2 Apache httpd: denial of service via mod_deflate
An attacker can send special data to Apache httpd with mod_deflate as an Input Filter, in order to trigger a denial of service...
2 Apache httpd: buffer overflow of mod_status
An attacker can generate a buffer overflow in mod_status of Apache httpd, in order to trigger a denial of service, and possibly to execute code...
2 Joomla com_youtubegallery: SQL injection
An attacker can use a SQL injection of Joomla com_youtubegallery, in order to read or alter data...
2 Cisco Unified Contact Center Enterprise: directory traversal
An attacker can traverse directories of Cisco Unified Contact Center Enterprise, in order to read a file in the service root path...
2 Linux kernel: privilege escalation via SOL_PPPOL2TP
An attacker can use a L2TP socket when the Linux kernel is compiled with SOL_PPPOL2TP, in order to escalate his privileges...
2 Drupal FileField: information disclosure
An attacker can use Drupal FileField, in order to obtain sensitive information...
2 Drupal: multiple vulnerabilities
An attacker can use several vulnerabilities of Drupal...
1 Linux kernel: memory corruption via ptrace
An attacker can write into the Linux kernel memory, in order to trigger a denial of service, and possibly to run code with kernel privileges...
2 Puppet Enterprise: multiple vulnerabilities
An attacker can use several vulnerabilities of Puppet Enterprise...
   recent vulnerabilities
3 OSPF: corrupting the routing database
An attacker can spoof OSPF messages, in order to corrupt the routing database...
2 Wireshark: four denials of service via the protocol dissectors
An attacker can trigger a fault in some dissectors, in order to trigger a denial of service or mask illicit network traffic...
1 GnuPG: buffer overflow of gpgme
An attacker can generate a buffer overflow in gpgme of GnuPG, in order to trigger a denial of service, and possibly to execute code...
1 Drupal Storage API: unsafe configuration
An attacker can upload a malicious file on Drupal Storage API, in order for example to upload a Trojan...
2 Drupal Date: Cross Site Scripting
An attacker can trigger a Cross Site Scripting in Drupal Date, in order to execute JavaScript code in the context of the web site...
2 WordPress WhyDoWork AdSense: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress WhyDoWork AdSense, in order to execute JavaScript code in the context of the web site...
2 Joomla Kunena Forum: Cross Site Scripting
An attacker can trigger Cross Site Scripting of Joomla Kunena Forum, in order to execute JavaScript code in the context of the web site...
2 Joomla Kunena Forum: SQL injection
An attacker can use SQL injections of Joomla Kunena Forum, in order to read or alter data...
4 Internet Explorer: multiple vulnerabilities
An attacker can use several vulnerabilities of Internet Explorer...
3 Windows: code execution via WinVerifyTrust
An attacker can alter a valid signed file, without being noticed by WinVerifyTrust, in order to deceive the victim so it runs the program...


Vulnerabilities are discovered daily and published on thousands of internet information sources.
Vigil@nce describes these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
Your team secures and protects your networks based on Vigil@nce information and tools.

your environment

  • a database describing more than 20000 vulnerabilities and their 30000 solutions
  • a web space where each user defines his preferences
  • alert and synthesis e-mails, to inform your teams
  • a customized tracking of your software and systems
  • a diary to plan solutions to install, and to monitor the security process of each computer
  • a manager view, and customized reports

your benefits

  • a customized watch on computer vulnerabilities and their solutions
  • an experienced team at your service for more than 14 years
  • a tool to monitor the security process of your networks and computers
  • a CVE compatible solution
  • a time saving for your team which concentrates on important tasks



















Copyright 1999-2014 Vigil@nce. Vigil@nce is a service from Orange Business Services. Site map. Legal notice. Version française