|Links on this page are stored alphabetically by link name. The "DATE" column lists the date we last verified the site and its relevancy to our community.
||Common Vulnerabilities and Exposures
||Common Vulnerabilities and Exposures (CVE) data sourced from NIST. Enter the name of a product to research into the "SEARCH" box.
View these links for information on the Oracle Database
But, most importantly, use this resource when considering moving to a different database to better assess the risks.
||This website, to use their own words, "is your gateway to the world of the Internet that centers on Technology,
Security, Privacy, Surveillance, Cyber warfare, Cybercrime and first hand Hacking News, with full-scale reviews on Social Media Platforms.
There is enough good information here to remind you to be more careful. What is sadly missing is that they focus exclusively on the perimeter and end-points.
They either have no clue, or are uninterested, in the part that data and databases play, as the ultimate target, of these attacks.
||Morgan's Library is one of the internet's largest repositories of information, syntax, code demos, and advice for the Oracle Database.
The Library was founded in 1998 when Morgan was teaching at the University of Washington as a resource for his students. It is now available, without the need to self-identify, to anyone with a browser.
The library is is updated sometimes daily and is in the process of being updated to version 19.3.
View this link for a direct link to the syntax and coded examples
|National Vulnerability Database
||This website is
hosted by the National Institute of Standards and Technology