|Links on this page are stored alphabetically by link name. The "DATE" column lists the date we last verified the site and its relevancy to our community.
||Common Vulnerabilities and Exposures (CVE) data sourced from NIST. Enter the name of a product to research into the "SEARCH" box.
View these links for information on the Oracle Database
But, most importantly, use this resource when considering moving to a different database to better assess the risks.
||This website, to
use their own words, "is your gateway to the world of the
Internet that centers on Technology, Security, Privacy,
Surveillance, Cyber warfare, Cybercrime and first hand
Hacking News, with full-scale reviews on Social Media
There is enough good information here to remind you to be
more careful. What is sadly missing is that they focus
exclusively on the perimeter and end-points. They either
have no clue, or are uninterested, in the part that data and
databases play, as the ultimate target, of these attacks.
||Morgan's Library is one of the internet's largest repositories of information, syntax, code demos, and advice for the Oracle Database.
The Library was founded in 1998 when Morgan was teaching at the University of Washington as a resource for his students. It is now available, without the need to self-identify, to anyone with a browser.
The library is is updated sometimes daily and is in the process of being updated to version 19.3.
View this link for a direct link to the syntax and coded examples