According to the SANS diary a popular database vendor announced 65 security vulnerabilites yesterday. That seems a great deal for a product that was billed as being “unbreakable”.
Let’s be clear – all software (of any size) has vulnerabilities – accepting this and being as transparent as possible about remediation steps is important IMHO.
It’s very frustrating that in this case it’s necessary to possess sign-in credentials to be able to find out any meaningful details of the vulnerabilites in question.
Apparently a support contact (identifier) of some kind is required to be able to even view any kind of information pertaining to the security exposure.
To browse the technical details of the security vulnerabilites reported for Microsoft products look here