Orange Business Services
Vigil@nce Vigil@nce Vigil@nce
we track for your security since 1999
 home presentation vulnerabilities documentation contact  
subscriber area subscriber area
free access free access

The Vigil@nce team watches vulnerabilities impacting your computers, and then offers solutions, a database and tools to correct them.

Each user customizes the list of software to track.

As soon as Vigil@nce publishes an alert for one of his software, the user receives a bulletin, containing an helpful explanation of the threat, its patches and workarounds.

The administrator then uses the online Vigil@nce diary in order to plan and track the security process.

Our offer...
public vulnerabilities
2 Splunk Enterprise: two vulnerabilities
An attacker can use two vulnerabilities of Splunk Enterprise...
3 IBM GSKit: infinite loop of SSL
An attacker can send malicious SSL/TLS messages to applications using IBM GSKit, in order to trigger a denial of service...
2 WordPress Plugin SI CAPTCHA Anti-Spam: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of SI CAPTCHA Anti-Spam for WordPress, in order to execute JavaScript code in the context of the web site...
2 WordPress Spider Video Player plugin: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Spider Video Player plugin, in order to execute JavaScript code in the context of the web site...
2 WordPress MyBand Theme: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress MyBand Theme, in order to execute JavaScript code in the context of the web site...
3 NetIQ Sentinel: code execution via NQMcsVarSet
An attacker can create a web page calling NQMcsVarSet of NetIQ Sentinel, to traverse directories and create a malicious program on victim's computer, in order to execute code...
3 WordPress cnhk-slideshow: file upload
An attacker can upload a malicious file on WordPress cnhk-slideshow, in order for example to upload a Trojan...
3 Dotclear: three vulnerabilities
An attacker can use several vulnerabilities of Dotclear...
1 IBM TSM Client: buffer overflow of GUI
An attacker can generate a buffer overflow in the GUI of IBM TSM Client, in order to trigger a denial of service...
1 Xen: denial of service via log_dirty
A local attacker can manipulate the memory of a HVM Xen guest system, in order to trigger a denial of service...
   recent vulnerabilities
3 Panda Security: buffer overflow of PavTPK.sys
An attacker can generate a buffer overflow in PavTPK.sys of Panda Security, in order to trigger a denial of service, and possibly to execute code with the kernel privilege level...
3 Embarcadero Delphi: buffer overflow of VCL
An attacker can generate a buffer overflow in the BMP library of Embarcadero Delphi, in order to trigger a denial of service, and possibly to execute code...
2 FortiNet FortiManager: denial of service
An attacker can send a specially ill formed request to FortiNet FortiManager, in order to trigger a denial of service...
2 WordPress Mobile Pack: retrieval of protected posts
An attacker can retrieve password protected articles managed by WordPress Mobile Pack...
2 WordPress Mobiloud: several Cross Site Scripting
An attacker can trigger Cross Site Scripting of WordPress Mobiloud, in order to execute JavaScript code in the context of the web site...
2 WordPress Disqus Comment System: Cross Site Request Forgery
An attacker can trigger Cross Site Request Forgeries of WordPress Disqus Comment System, in order to force the victim to perform operations...
2 Asterisk: buffer overflow of __ast_string_field_ptr_build_va
An attacker can generate a buffer overflow in __ast_string_field_ptr_build_va of Asterisk, in order to trigger a denial of service, and possibly to execute code...
3 IBM WebSphere 8.5: multiple vulnerabilities
An attacker can use several vulnerabilities of IBM WebSphere 8.5...
2 WordPress wp-source-control: directory traversal in downloadfiles/download.php
An attacker can traverse directories in downloadfiles/download.php of WordPress wp-source-control, in order to read a file outside the service root path...
2 Cisco NX-OS: VLAN identifier retrieval via SNMP
An attacker can query the SNMP server of Cisco NX-OS, in order to get valid VLAN identifiers...


Vulnerabilities are discovered daily and published on thousands of internet information sources.
Vigil@nce describes these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
Your team secures and protects your networks based on Vigil@nce information and tools.

your environment

  • a database describing more than 20000 vulnerabilities and their 30000 solutions
  • a web space where each user defines his preferences
  • alert and synthesis e-mails, to inform your teams
  • a customized tracking of your software and systems
  • a diary to plan solutions to install, and to monitor the security process of each computer
  • a manager view, and customized reports

your benefits

  • a customized watch on computer vulnerabilities and their solutions
  • an experienced team at your service for more than 14 years
  • a tool to monitor the security process of your networks and computers
  • a CVE compatible solution
  • a time saving for your team which concentrates on important tasks



















Copyright 1999-2014 Vigil@nce. Vigil@nce is a service from Orange Business Services. Site map. Legal notice. Version française