The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Ingres Database

Ingres Database: buffer overflow via IIPROMPT
When Ingres Database is installed on Windows, an attacker can generate an overflow, in order to execute code...
125598, 421194, BID-49435, VIGILANCE-VUL-10968
Ingres: buffer overflow of iidbms
An attacker can send a malicious query to the iidbms process of Ingres, in order to generate a denial of service or to execute code...
123208, BID-38001, VIGILANCE-VUL-9393
Ingres Database: multiple vulnerabilities
Several vulnerabilities had been announced in Ingres...
BID-30512, CERTA-2008-AVI-390, CVE-2008-3356, CVE-2008-3357, CVE-2008-3389, VIGILANCE-VUL-7994
Ingres: incorrect authentication
Under Windows, the second user who logs into Ingres is connected as the first user...
415703, BID-2695, CAID 35970, CERTA-2007-AVI-558, CVE-2007-6334, VIGILANCE-VUL-7437
Ingres: several vulnerabilities
Several vulnerabilities affects the Ingres database...
115911, 115913, 115927, 117523, BID-24585, CAID 35450, CAID 35451, CAID 35452, CERTA-2007-AVI-275, CVE-2007-3334, CVE-2007-3336, CVE-2007-3337, CVE-2007-3338, VIGILANCE-VUL-6933
Our database contains other pages. You can request a free trial to read them.