In infinite wisdom "Jerry Schwartz" wrote:
> Back when this was a day-to-day concern of mine, I used to check CERT's
> website (the section now known as their "Vulnerability Notes Database",
> http://www.kb.cert.org/vuls).
If securing the database is your job, then you really need to drink fr
Back when this was a day-to-day concern of mine, I used to check CERT's
website (the section now known as their "Vulnerability Notes Database",
http://www.kb.cert.org/vuls). Unfortunately, I see that the last entry for
MySQL is from years ago.
Regards,
Jerry Schwartz
Global Information Incorpo
ement obligatoire. Étant donné que les email peuvent facilement
être sujets à la manipulation, nous ne pouvons accepter aucune responsabilité
pour le contenu fourni.
> From: wult...@gmail.com
> Date: Mon, 24 May 2010 13:45:35 -0700
> Subject: Re: Security issues
> To: mgai..
On Mon, May 24, 2010 at 1:42 PM, Martin Gainty wrote:
> Good Afternoon Rob-
>
> if you're implementing either glassfish or weblogic webserver
> your "best fit solution" would be Oracle Identity Manager
>
> there are 'other' identity solutions such as RSA which are
> 1)far more complex ..
> 2)virtu
email peuvent facilement
être sujets à la manipulation, nous ne pouvons accepter aucune responsabilité
pour le contenu fourni.
> From: wult...@gmail.com
> Date: Mon, 24 May 2010 13:27:52 -0700
> Subject: Re: Security issues
> To: je...@gii.co.jp
> CC: mgai...@hotmail.com; mysql
On Mon, May 24, 2010 at 12:07 PM, Jerry Schwartz wrote:
>>-Original Message-
>>From: Rob Wultsch [mailto:wult...@gmail.com]
>>Sent: Saturday, May 22, 2010 11:52 AM
>>To: Martin Gainty
>>Cc: mysql@lists.mysql.com
>>Subject: Re: Security issues
>>
>-Original Message-
>From: Rob Wultsch [mailto:wult...@gmail.com]
>Sent: Saturday, May 22, 2010 11:52 AM
>To: Martin Gainty
>Cc: mysql@lists.mysql.com
>Subject: Re: Security issues
>
>On Sat, May 22, 2010 at 5:44 AM, Martin Gainty wrote:
>> Good Morning Rob-
You could use CVE, Postgre's security page doesn't seem to sync with their
CVE entries, even though they reference CVE entries on their comprehensive
security page.
http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=postgresql
http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=mysql
JW
On Sat, May 22
On Sat, May 22, 2010 at 5:44 AM, Martin Gainty wrote:
> Good Morning Rob-
>
> one vulnerability (with UDFs)
> http://dev.mysql.com/tech-resources/articles/security_alert.html
>
> a manager considering a enterprise-wide security solution may want
> to consider Oracle Identity Manager (with Glassfis
Good Morning Rob-
one vulnerability (with UDFs)
http://dev.mysql.com/tech-resources/articles/security_alert.html
a manager considering a enterprise-wide security solution may want to consider
Oracle Identity Manager (with Glassfish 3.2)
http://under-linux.org/en/content/oracle-introduces-
On Wed, 2004-01-14 at 13:32, Chris W wrote:
> Are there many php or mysql configuration considerations for making the
> site secure? I have already done the obvious with my sql and set up the
> grant tables with passwords for all users and removed the [EMAIL PROTECTED] user.
Give the MySQL user
This also does not enable me to upload a data file. My resulting SQL
cardrdc> statement reads:
cardrdc> LOAD DATA LOCAL '/tmp/phpgPhl51' INTO TABLE test FIELDS TERMINATED BY ','
cardrdc> ENCLOSED BY '"' ESCAPED BY '\\' LINES TERMINATED BY '\r\n'
cardrdc> I have also tried:
cardrdc> LOAD DATA LOC
Original Message -
From: "Egor Egorov" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Tuesday, December 03, 2002 5:50 AM
Subject: re: Security issues with LOAD DATA
> Chris,
> Tuesday, December 03, 2002, 6:58:39 AM, you wrote:
>
> CW> I developed a
Chris,
Tuesday, December 03, 2002, 6:58:39 AM, you wrote:
CW> I developed a PHP application where users can update a mySQL table using
CW> LOAD DATA. Recently I installed this application on another web server where
CW> the File Permissions have been set such that this method of uploading data
CW>
14 matches
Mail list logo