Orange Business Services
Vigil@nce Vigil@nce Vigil@nce
we track for your security since 1999
 home presentation vulnerabilities documentation contact  
subscriber area subscriber area
free access free access

The Vigil@nce team watches vulnerabilities impacting your computers, and then offers solutions, a database and tools to correct them.

Each user customizes the list of software to track.

As soon as Vigil@nce publishes an alert for one of his software, the user receives a bulletin, containing an helpful explanation of the threat, its patches and workarounds.

The administrator then uses the online Vigil@nce diary in order to plan and track the security process.

Our offer...
public vulnerabilities
2 Drupal Skeleton: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Skeleton, in order to execute JavaScript code in the context of the web site...
2 Drupal SimpleCorp: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal SimpleCorp, in order to execute JavaScript code in the context of the web site...
2 Drupal Revisioning: information disclosure
An attacker can use Drupal Revisioning, in order to obtain sensitive information...
2 Drupal BlueMasters: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal BlueMasters, in order to execute JavaScript code in the context of the web site...
2 Junos: denial of service via EWF
An attacker can use a special url on SRX Series with Enhanced Web Filtering, in order to trigger a denial of service of Junos...
2 Junos: denial of service via MPC
An attacker can send IP packets to generate an error in the Modular Port Concentrator of Junos, in order to trigger a denial of service...
2 Junos: denial of service via Dynamic IPsec VPN
An attacker can block connections on Dynamic IPsec VPN of Junos with Branch SRX Series, in order to trigger a denial of service...
2 Junos: Cross Site Scripting of J-Web
An attacker can trigger a Cross Site Scripting in J-Web of Junos, in order to execute JavaScript code in the context of the web site...
2 Junos: denial of service via IGMP
An attacker can send numerous IGMP packets to Junos with PIM, in order to trigger a denial of service...
2 Junos: Cross Site Scripting of J-Web
An attacker can trigger a Cross Site Scripting in J-Web of Junos, in order to execute JavaScript code in the context of the web site...
   recent vulnerabilities
2 SIMATIC S7-1200: two vulnerabilities
An attacker can use several vulnerabilities of SIMATIC S7-1200...
2 Cisco IOS: denial of service via RTCP
An attacker can send malicious RTCP packets to Cisco IOS, in order to trigger a denial of service...
2 Cisco IOS: denial of service via AS5400
An attacker can generate an error of Cisco IOS on AS5400, in order to trigger a denial of service...
2 Cisco IOS: denial of service via VoIP
An attacker can send malicious VoIP data to Cisco IOS, in order to trigger a denial of service...
2 Cisco IOS: denial of service via BGP Path Attributes
An attacker can send malicious BGP Path Attributes to Cisco IOS, in order to trigger a denial of service...
1 Cisco IOS: denial of service via object-group
A local attacker can edit object-groups of Cisco IOS, in order to trigger a denial of service...
1 Cisco IOS: memory leak via VTY
An authenticated attacker can use VTY sessions, to create a memory leak in Cisco IOS, in order to trigger a denial of service...
2 Cisco IOS: VPN traffic forwarding via Flex-VPN load-balancing
An attacker can use the Flex-VPN load-balancing feature, in order to forward a VPN traffic...
2 Cisco IOS: denial of service via IKEv2
An attacker can send malicious IKEv2 packets to Cisco IOS, in order to trigger a denial of service...
2 Cisco IOS: denial of service via SSH
An attacker can establish an SSH Idle session to Cisco IOS, in order to trigger a denial of service...


Vulnerabilities are discovered daily and published on thousands of internet information sources.
Vigil@nce describes these vulnerabilities and how to protect your system. This information is customized according to your environment, it is available on a web site and sent by e-mail alerts.
Your team secures and protects your networks based on Vigil@nce information and tools.

your environment

  • a database describing more than 20000 vulnerabilities and their 30000 solutions
  • a web space where each user defines his preferences
  • alert and synthesis e-mails, to inform your teams
  • a customized tracking of your software and systems
  • a diary to plan solutions to install, and to monitor the security process of each computer
  • a manager view, and customized reports

your benefits

  • a customized watch on computer vulnerabilities and their solutions
  • an experienced team at your service for more than 14 years
  • a tool to monitor the security process of your networks and computers
  • a CVE compatible solution
  • a time saving for your team which concentrates on important tasks



















Copyright 1999-2014 Vigil@nce. Vigil@nce is a service from Orange Business Services. Site map. Legal notice. Version française