You could use CVE, Postgre's security page doesn't seem to sync with their
CVE entries, even though they reference CVE entries on their comprehensive
security page.

http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=postgresql

http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=mysql

JW

On Sat, May 22, 2010 at 10:51 AM, Rob Wultsch <wult...@gmail.com> wrote:

> On Sat, May 22, 2010 at 5:44 AM, Martin Gainty <mgai...@hotmail.com>
> wrote:
> > Good Morning Rob-
> >
> > one vulnerability (with UDFs)
> > http://dev.mysql.com/tech-resources/articles/security_alert.html
> >
> > a manager considering a enterprise-wide security solution may want
> > to consider Oracle Identity Manager (with Glassfish 3.2)
> >
> http://under-linux.org/en/content/oracle-introduces-schedule-for-glassfish-556/
> >
> > Does this help?
> > Martin Gainty
>
> Martin,
>
> Thank you for the reply.
>
> The guys across the street have a single page with cliff notes about
> every vulnerability effecting every supported version*. The page I
> noted was comprehensive. Martin, what you listed was a page with an
> single vuln and a page which looks like a product.
>
> The grass is looking pretty darn green on the other side of the street.
>
> *And they support all the way back to 7.4, which is equivalent to 4.1
> era. 2005 is not that long ago.
> --
> Rob Wultsch
> wult...@gmail.com
>
> --
> MySQL General Mailing List
> For list archives: http://lists.mysql.com/mysql
> To unsubscribe:    http://lists.mysql.com/mysql?unsub=joh...@pixelated.net
>
>


-- 
-----------------------------
Johnny Withers
601.209.4985
joh...@pixelated.net

Reply via email to