<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Security on FromDual GmbH</title><link>https://www.fromdual.com/tags/security/</link><description>Recent content in Security on FromDual GmbH</description><generator>Hugo</generator><language>en-GB</language><managingEditor>oli.sennhauser@fromdual.com (Oli Sennhauser)</managingEditor><webMaster>oli.sennhauser@fromdual.com (Oli Sennhauser)</webMaster><copyright>© FromDual GmbH</copyright><lastBuildDate>Thu, 06 Mar 2025 09:50:18 +0000</lastBuildDate><atom:link href="https://www.fromdual.com/tags/security/index.xml" rel="self" type="application/rss+xml"/><item><title>MariaDB Honeypot</title><link>https://www.fromdual.com/blog/mariadb-honeypot/</link><pubDate>Thu, 06 Mar 2025 09:50:18 +0000</pubDate><author>oli.sennhauser@fromdual.com (Oli Sennhauser)</author><guid>https://www.fromdual.com/blog/mariadb-honeypot/</guid><description>&lt;p&gt;In our &lt;a href="https://www.fromdual.com/advanced-mysql-mariadb-training"&gt;MariaDB advanced training courses&lt;/a&gt;, which we hold approximately every two months, we use machines that are directly exposed to the Internet with a public IP address.
&lt;strong&gt;Warning&lt;/strong&gt;: You should NEVER expose a database directly to the Internet without protection!
Typically, it takes less than 72 hours (3 days) before we are exposed to the first external access attempts.&lt;/p&gt;</description></item><item><title>MariaDB Push Replication</title><link>https://www.fromdual.com/blog/mariadb-push-replication/</link><pubDate>Mon, 11 Jan 2021 17:29:50 +0000</pubDate><author>oli.sennhauser@fromdual.com (Oli Sennhauser)</author><guid>https://www.fromdual.com/blog/mariadb-push-replication/</guid><description>&lt;h2 id="table-of-contents"&gt;Table of Contents&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.fromdual.com/blog/mariadb-push-replication/#mariadb-pull-replication"&gt;How to make MariaDB Pull Replication as secure as possible&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.fromdual.com/blog/mariadb-push-replication/#mariadb-push-replication"&gt;MariaDB Push Replication&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.fromdual.com/blog/mariadb-push-replication/#pushing-data-with-federatedx"&gt;Pushing data with the FederatedX Storage Engine and Triggers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.fromdual.com/blog/mariadb-push-replication/#traffic-mirroring-with-mariadb-maxscale"&gt;Traffic mirroring with MariaDB MaxScale or ProxySQL&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="how-to-make-mariadb-pull-replication-as-secure-as-possible"&gt;How to make MariaDB Pull Replication as secure as possible&lt;/h2&gt;
&lt;p&gt;A normal MariaDB Replication is a Pull Replication. This means that a Slave connects to its Master and gathers or better requests Binary Log information from the Master and applies them in a streaming way.&lt;/p&gt;</description></item><item><title>Oracle releases MySQL security vulnerability fixes 2018-01</title><link>https://www.fromdual.com/blog/oracle-releases-mysql-security-vulnerability-fixes-2018-01/</link><pubDate>Wed, 17 Jan 2018 11:27:28 +0000</pubDate><author>oli.sennhauser@fromdual.com (Oli Sennhauser)</author><guid>https://www.fromdual.com/blog/oracle-releases-mysql-security-vulnerability-fixes-2018-01/</guid><description>&lt;p&gt;As in every quarter of the year Oracle has released yesterday its recommendation for the MySQL security updates. This is called, in Oracle terminology, &lt;a href="http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" target="_blank" title="Oracle Critical Patch Update Advisory - January 2018"&gt;Critical Patch Update (CPU) Advisory&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>MySQL and MariaDB authentication against pam_unix</title><link>https://www.fromdual.com/blog/mysql-and-mariadb-authentication-against-pam-unix/</link><pubDate>Mon, 13 Feb 2017 18:02:08 +0000</pubDate><author>oli.sennhauser@fromdual.com (Oli Sennhauser)</author><guid>https://www.fromdual.com/blog/mysql-and-mariadb-authentication-against-pam-unix/</guid><description>&lt;p&gt;The PAM authentication plugin is an extension included in MySQL Enterprise Edition (since 5.5) and in MariaDB (since 5.2).&lt;/p&gt;</description></item><item><title>Non-standard database set up with SELinux</title><link>https://www.fromdual.com/blog/non-standard-database-set-up-with-selinux/</link><pubDate>Tue, 13 Dec 2016 15:26:19 +0000</pubDate><author>oli.sennhauser@fromdual.com (Oli Sennhauser)</author><guid>https://www.fromdual.com/blog/non-standard-database-set-up-with-selinux/</guid><description>&lt;h2 id="what-is-selinux"&gt;What is SELinux?&lt;/h2&gt;
&lt;p&gt;The Security-Enhanced Linux is an extension to the Linux Kernel, made by the NSA (National Security Agency). It implements Mandatory Access Controls (MAC), which allow an administrator to define, how applications and users can access resources on a system.&lt;/p&gt;</description></item><item><title>MySQL and MariaDB Security</title><link>https://www.fromdual.com/blog/mysql-security/</link><pubDate>Fri, 18 Jan 2013 09:27:09 +0000</pubDate><author>oli.sennhauser@fromdual.com (Oli Sennhauser)</author><guid>https://www.fromdual.com/blog/mysql-security/</guid><description>&lt;h2 id="overview"&gt;Overview&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.fromdual.com/blog/mysql-security/#mysql-security-products"&gt;MySQL Security Products&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.fromdual.com/blog/mysql-security/#useful-security-links"&gt;Useful Security Links&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.fromdual.com/blog/mysql-security/#security-vulnerabilities-fixed-in-mariadb"&gt;Security Vulnerabilities Fixed in MariaDB&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.fromdual.com/blog/mysql-security/#oracle-critical-patch-update-advisory-for-mysql"&gt;Oracle Critical Patch Update (CPU) Advisory for MySQL&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.fromdual.com/blog/mysql-security/#redhat-centos-vulnerabilities"&gt;RedHat/CentOS vulnerabilities by CVE name&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.fromdual.com/blog/mysql-security/#ubuntu-security-notice-for-mariadb"&gt;Ubuntu Security Notice (USN) for MariaDB&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.fromdual.com/blog/mysql-security/#ubuntu-security-notice-for-mysql"&gt;Ubuntu Security Notice (USN) for MySQL&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.fromdual.com/blog/mysql-security/#debian-security-advisories"&gt;Debian Security Advisories&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.fromdual.com/blog/mysql-security/#debian-security-advisories-for-mysql"&gt;Debian Security Advisories for MySQL&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.exploit-db.com/search/?action=search&amp;amp;description=mysql" target="_blank" title="MySQL Exploits"&gt;MySQL Exploits&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.fromdual.com/blog/mysql-security/#debian-security-advisories-for-mariadb"&gt;Debian Security Advisories for MariaDB&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.exploit-db.com/search/?action=search&amp;amp;description=mariadb" target="_blank" title="MariaDB Exploits"&gt;MariaDB Exploits&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.fromdual.com/mariadb-security-risk-matrix" target="_blank" title="MariaDB Security Risk Matrix"&gt;MariaDB Security Risk Matrix&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.fromdual.com/blog/mysql-security/#auscert"&gt;Cyber Emergency Response Team (CERT) in Australia and APAC&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://hackerone.com/mariadb?type=team" target="_blank" title="MariaDB Security | HackerOne"&gt;MariaDB Security | HackerOne&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="mysql-security-products"&gt;MySQL Security Products&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Database Firewall: &lt;a href="http://www.greensql.com/" target="_blank"&gt;GreenSQL&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;MySQL Database Security: &lt;a href="http://www.mcafee.com/us/products/database-security/mysql-plug-in.aspx" target="_blank"&gt;McAfee&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="useful-security-links"&gt;Useful Security Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://public.cyber.mil/announcement/stig-update-disa-releases-the-mariadb-enterprise-10-x-security-technical-implementation-guide/" target="_blank"&gt;STIG Update: DISA releases the MariaDB Enterprise 10.x Security Technical Implementation Guide&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;OWASP: &lt;a href="https://cheatsheetseries.owasp.org/cheatsheets/Database_Security_Cheat_Sheet.html" target="_blank" title="Database Security Cheat Sheet"&gt;Database Security Cheat Sheet&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://benchmarks.cisecurity.org/" target="_blank" title="Center for Internet Security"&gt;CIS&lt;/a&gt; &lt;a href="https://benchmarks.cisecurity.org/tools2/mysql/CIS_MySQL_Benchmark_v1.0.2.pdf" target="_blank" title="The Center for Internet Security CIS"&gt;MySQL 4.1/5.0/5.1 Benchmark&lt;/a&gt; (v1.0.2)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://benchmarks.cisecurity.org/" target="_blank" title="Center for Internet Security"&gt;CIS&lt;/a&gt; &lt;a href="https://benchmarks.cisecurity.org/tools2/mysql/CIS_Oracle_MySQL_Community_Edition_5.6_Benchmark_v1.1.0.pdf" target="_blank" title="The Center for Internet Security CIS"&gt;Oracle MySQL Community Server 5.6 Benchmark&lt;/a&gt; (v1.1.0)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://benchmarks.cisecurity.org/" target="_blank" title="Center for Internet Security"&gt;CIS&lt;/a&gt; &lt;a href="https://benchmarks.cisecurity.org/tools2/mysql/CIS_Oracle_MySQL_Community_Edition_5.7_Benchmark_v1.0.0.pdf" target="_blank" title="The Center for Internet Security CIS"&gt;Oracle MySQL Community Server 5.7 Benchmark&lt;/a&gt; (v1.0.0)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://benchmarks.cisecurity.org/" target="_blank" title="Center for Internet Security"&gt;CIS&lt;/a&gt; &lt;a href="https://benchmarks.cisecurity.org/tools2/mysql/CIS_Oracle_MySQL_Enterprise_Edition_5.6_Benchmark_v1.1.0.pdf" target="_blank" title="The Center for Internet Security CIS"&gt;Oracle MySQL Enterprise Edition 5.6 Benchmark&lt;/a&gt; (v1.1.0)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://benchmarks.cisecurity.org/" target="_blank" title="Center for Internet Security"&gt;CIS&lt;/a&gt; &lt;a href="https://benchmarks.cisecurity.org/tools2/mysql/CIS_Oracle_MySQL_Enterprise_Edition_5.7_Benchmark_v1.0.0.pdf" target="_blank" title="The Center for Internet Security CIS"&gt;Oracle MySQL Enterprise Edition 5.7 Benchmark&lt;/a&gt; (v1.0.0)&lt;/li&gt;
&lt;li&gt;MySQL Documentation: &lt;a href="http://dev.mysql.com/doc/refman/5.7/en/security.html" target="_blank"&gt;Security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;BSI certified &lt;a href="https://www.bsi.bund.de/DE/Themen/ZertifizierungundAnerkennung/Produktzertifizierung/ZertifizierungnachCC/ZertifizierteProdukte/Serveranwendungen/Serveranwendungen_node.html#doc2966472bodyText1" target="_blank"&gt;database servers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.cvedetails.com/vulnerability-list/vendor_id-185/cvssscoremin-9/cvssscoremax-/Mysql.html" target="_blank"&gt;CVE Details&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://rhn.redhat.com/errata/RHSA-2013-0121.html" target="_blank" title="Low: mysql security and bug fix update"&gt;RHSA-2013:0121-1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://rhn.redhat.com/errata/RHSA-2012-1462.html" target="_blank" title="Important: mysql security update"&gt;RHSA-2012:1462-1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://lists.grok.org.uk/mailman/listinfo/full-disclosure" target="_blank"&gt;&lt;a href="mailto:full-disclosure@lists.grok.org.uk"&gt;full-disclosure@lists.grok.org.uk&lt;/a&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://forums.mysql.com/list.php?30" target="_blank"&gt;MySQL Security Forum&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://pentestmonkey.net/cheat-sheet/sql-injection/mysql-sql-injection-cheat-sheet" target="_blank" title="MySQL SQL Injection Cheat Sheet"&gt;MySQL SQL Injection Cheat Sheet&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="security-vulnerabilities-fixed-in-mariadb"&gt;Security Vulnerabilities Fixed in MariaDB&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://mariadb.com/kb/en/mariadb/security/" target="_blank" title="Security Vulnerabilities Fixed in MariaDB"&gt;Security Vulnerabilities Fixed in MariaDB&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.fromdual.com/mariadb-security-risk-matrix/index.php" title="MariaDB Security Risk Matrix"&gt;MariaDB Security Risk Matrix&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="oracle-critical-patch-update-cpu-advisory-for-mysql"&gt;Oracle Critical Patch Update (CPU) Advisory for MySQL&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/technetwork/topics/security/alerts-086861.html" target="_blank" title="Oracle CPU Overview"&gt;Oracle Critical Patch Update Advisory - Overview&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL" target="_blank" title="Oracle CPU 2024-10"&gt;Oracle Critical Patch Update Advisory - October 2024&lt;/a&gt; (45 fixes / 9.1 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuoct2024verbose.html#MSQL" target="_blank" title="Oracle CPU 2024-10 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujul2024.html#AppendixMSQL" target="_blank" title="Oracle CPU 2024-07"&gt;Oracle Critical Patch Update Advisory - July 2024&lt;/a&gt; (37 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujul2024verbose.html#MSQL" target="_blank" title="Oracle CPU 2024-07 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuapr2024.html#AppendixMSQL" target="_blank" title="Oracle CPU 2024-04"&gt;Oracle Critical Patch Update Advisory - April 2024&lt;/a&gt; (36 fixes / 7.5 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuapr2024verbose.html#MSQL" target="_blank" title="Oracle CPU 2024-04 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujan2024.html#AppendixMSQL" target="_blank" title="Oracle CPU 2024-01"&gt;Oracle Critical Patch Update Advisory - January 2024&lt;/a&gt; (40 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujan2024verbose.html#MSQL" target="_blank" title="Oracle CPU 2024-01 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuoct2023.html#AppendixMSQL" target="_blank" title="Oracle CPU 2023-10"&gt;Oracle Critical Patch Update Advisory - October 2023&lt;/a&gt; (37 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuoct2023verbose.html#MSQL" target="_blank" title="Oracle CPU 2023-10 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujul2023.html#AppendixMSQL" target="_blank" title="Oracle CPU 2023-07"&gt;Oracle Critical Patch Update Advisory - July 2023&lt;/a&gt; (24 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujul2023verbose.html#MSQL" target="_blank" title="Oracle CPU 2023-07 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuapr2023.html#AppendixMSQL" target="_blank" title="Oracle CPU 2023-04"&gt;Oracle Critical Patch Update Advisory - April 2023&lt;/a&gt; (34 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuapr2023verbose.html#MSQL" target="_blank" title="Oracle CPU 2023-04 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujan2023.html#AppendixMSQL" target="_blank" title="Oracle CPU 2023-01"&gt;Oracle Critical Patch Update Advisory - January 2023&lt;/a&gt; (37 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujan2023verbose.html#MSQL" target="_blank" title="Oracle CPU 2023-01 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuoct2022.html#AppendixMSQL" target="_blank" title="Oracle CPU 2022-10"&gt;Oracle Critical Patch Update Advisory - October 2022&lt;/a&gt; (37 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuoct2022verbose.html#MSQL" target="_blank" title="Oracle CPU 2022-10 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujul2022.html#AppendixMSQL" target="_blank" title="Oracle CPU 2022-07"&gt;Oracle Critical Patch Update Advisory - July 2022&lt;/a&gt; (34 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujul2022verbose.html#MSQL" target="_blank" title="Oracle CPU 2022-07 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixMSQL" target="_blank" title="Oracle CPU 2022-04"&gt;Oracle Critical Patch Update Advisory - April 2022&lt;/a&gt; (43 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuapr2022verbose.html#MSQL" target="_blank" title="Oracle CPU 2022-04 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujan2022.html#AppendixMSQL" target="_blank" title="Oracle CPU 2022-01"&gt;Oracle Critical Patch Update Advisory - January 2022&lt;/a&gt; (78 fixes / 7.5 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujan2022verbose.html#MSQL" target="_blank" title="Oracle CPU 2022-01 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuoct2021.html#AppendixMSQL" target="_blank" title="Oracle CPU 2021-10"&gt;Oracle Critical Patch Update Advisory - October 2021&lt;/a&gt; (66 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuoct2021verbose.html#MSQL" target="_blank" title="Oracle CPU 2021-10 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujul2021.html#AppendixMSQL" target="_blank" title="Oracle CPU 2021-07"&gt;Oracle Critical Patch Update Advisory - July 2021&lt;/a&gt; (41 fixes / 8.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujul2021verbose.html#MSQL" target="_blank" title="Oracle CPU 2021-07 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuapr2021.html#AppendixMSQL" target="_blank" title="Oracle CPU 2021-04"&gt;Oracle Critical Patch Update Advisory - April 2021&lt;/a&gt; (49 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuapr2021verbose.html#MSQL" target="_blank" title="Oracle CPU 2021-04 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujan2021.html#AppendixMSQL" target="_blank" title="Oracle CPU 2021-01"&gt;Oracle Critical Patch Update Advisory - January 2021&lt;/a&gt; (43 fixes / 7.5 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujan2021verbose.html#MSQL" target="_blank" title="Oracle CPU 2021-01 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuoct2020.html#AppendixMSQL" target="_blank" title="Oracle CPU 2020-10"&gt;Oracle Critical Patch Update Advisory - October 2020&lt;/a&gt; (53 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuoct2020verbose.html#MSQL" target="_blank" title="Oracle CPU 2020-10 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujul2020.html#AppendixMSQL" target="_blank" title="Oracle CPU 2020-07"&gt;Oracle Critical Patch Update Advisory - July 2020&lt;/a&gt; (40 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujul2020verbose.html#MSQL" target="_blank" title="Oracle CPU 2020-07 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuapr2020.html#AppendixMSQL" target="_blank" title="Oracle CPU 2020-04"&gt;Oracle Critical Patch Update Advisory - April 2020&lt;/a&gt; (45 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuapr2020verbose.html#MSQL" target="_blank" title="Oracle CPU 2020-04 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujan2020.html#AppendixMSQL" target="_blank" title="Oracle CPU 2020-01"&gt;Oracle Critical Patch Update Advisory - January 2020&lt;/a&gt; (19 fixes / 7.5 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujan2020verbose.html#MSQL" target="_blank" title="Oracle CPU 2020-01 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuoct2019.html#AppendixMSQL" target="_blank" title="Oracle CPU 2019-10"&gt;Oracle Critical Patch Update Advisory - October 2019&lt;/a&gt; (34 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuoct2019verbose.html#MSQL" target="_blank" title="Oracle CPU 2019-10 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujul2019.html#AppendixMSQL" target="_blank" title="Oracle CPU 2019-07"&gt;Oracle Critical Patch Update Advisory - July 2019&lt;/a&gt; (45 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujul2019verbose.html#MSQL" target="_blank" title="Oracle CPU 2019-07 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuapr2019.html#AppendixMSQL" target="_blank" title="Oracle CPU 2019-04"&gt;Oracle Critical Patch Update Advisory - April 2019&lt;/a&gt; (45 fixes / 7.5 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuapr2019verbose.html#MSQL" target="_blank" title="Oracle CPU 2019-04 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujan2019.html#AppendixMSQL" target="_blank" title="Oracle CPU 2019-01"&gt;Oracle Critical Patch Update Advisory - January 2019&lt;/a&gt; (30 fixes / 9.1 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujan2019verbose.html#MSQL" target="_blank" title="Oracle CPU 2019-01 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuoct2018.html#AppendixMSQL" target="_blank" title="Oracle CPU 2018-10"&gt;Oracle Critical Patch Update Advisory - October 2018&lt;/a&gt; (38 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuoct2018verbose.html#MSQL" target="_blank" title="Oracle CPU 2018-10 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujul2018.html#AppendixMSQL" target="_blank" title="Oracle CPU 2018-07"&gt;Oracle Critical Patch Update Advisory - July 2018&lt;/a&gt; (31 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujul2018verbose.html#MSQL" target="_blank" title="Oracle CPU 2018-07 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuapr2018.html#AppendixMSQL" target="_blank" title="Oracle CPU 2018-04"&gt;Oracle Critical Patch Update Advisory - April 2018&lt;/a&gt; (33 fixes / 7.7 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuapr2018verbose.html#MSQL" target="_blank" title="Oracle CPU 2018-04 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujan2018.html#AppendixMSQL" target="_blank" title="Oracle CPU 2018-01"&gt;Oracle Critical Patch Update Advisory - January 2018&lt;/a&gt; (25 fixes / 8.1 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujan2018verbose.html#MSQL" target="_blank" title="Oracle CPU 2018-01 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuoct2017.html#AppendixMSQL" target="_blank" title="Oracle CPU 2017-10"&gt;Oracle Critical Patch Update Advisory - October 2017&lt;/a&gt; (25 fixes / 8.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuoct2017verbose.html#MSQL" target="_blank" title="Oracle CPU 2017-10 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujul2017.html#AppendixMSQL" target="_blank" title="Oracle CPU 2017-07"&gt;Oracle Critical Patch Update Advisory - July 2017&lt;/a&gt; (30 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujul2017verbose.html#MSQL" target="_blank" title="Oracle CPU 2017-07 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuapr2017.html#AppendixMSQL" target="_blank" title="Oracle CPU 2017-04"&gt;Oracle Critical Patch Update Advisory - April 2017&lt;/a&gt; (39 fixes / 10.0 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuapr2017verbose.html#MSQL" target="_blank" title="Oracle CPU 2017-04 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujan2017.html#AppendixMSQL" target="_blank" title="Oracle CPU 2017-01"&gt;Oracle Critical Patch Update Advisory - January 2017&lt;/a&gt; (27 fixes / 8.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujan2017verbose.html#MSQL" target="_blank" title="Oracle CPU 2017-01 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuoct2016.html#AppendixMSQL" target="_blank" title="Oracle CPU 2016-10"&gt;Oracle Critical Patch Update Advisory - October 2016&lt;/a&gt; (31 fixes / 7.5 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuoct2016verbose.html#MSQL" target="_blank" title="Oracle CPU 2016-10 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujul2016.html#AppendixMSQL" target="_blank" title="Oracle CPU 2016-07"&gt;Oracle Critical Patch Update Advisory - July 2016&lt;/a&gt; (22 fixes / 8.1 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujul2016verbose.html#MSQL" target="_blank" title="Oracle CPU 2016-07 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuapr2016.html#AppendixMSQL" target="_blank" title="Oracle CPU 2016-04"&gt;Oracle Critical Patch Update Advisory - April 2016&lt;/a&gt; (31 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuapr2016verbose.html#MSQL" target="_blank" title="Oracle CPU 2016-04 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujan2016.html#AppendixMSQL" target="_blank" title="Oracle CPU 2016-01"&gt;Oracle Critical Patch Update Advisory - January 2016&lt;/a&gt; (22 fixes / 7.2 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujan2016verbose.html#MSQL" target="_blank" title="Oracle CPU 2016-01 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuoct2015.html#AppendixMSQL" target="_blank" title="Oracle CPU 2015-10"&gt;Oracle Critical Patch Update Advisory - October 2015&lt;/a&gt; (30 fixes / 9.0 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuoct2015verbose.html#MSQL" target="_blank" title="Oracle CPU 2015-10 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujul2015.html#AppendixMSQL" target="_blank" title="Oracle CPU 2015-07"&gt;Oracle Critical Patch Update Advisory - July 2015&lt;/a&gt; (18 fixes / 6.5 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujul2015verbose.html#MSQL" target="_blank" title="Oracle CPU 2015-07 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuapr2015.html#AppendixMSQL" target="_blank" title="Oracle CPU 2015-04"&gt;Oracle Critical Patch Update Advisory - April 2015&lt;/a&gt; (26 fixes / 10.0 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuapr2015verbose.html#MSQL" target="_blank" title="Oracle CPU 2015-04 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujan2015.html#AppendixMSQL" target="_blank" title="Oracle CPU 2015-01"&gt;Oracle Critical Patch Update Advisory - January 2015&lt;/a&gt; (9 fixes / 7.5 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujan2015verbose.html#MSQL" target="_blank" title="Oracle CPU 2015-01 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuoct2014.html#AppendixMSQL" target="_blank" title="Oracle CPU 2014-10"&gt;Oracle Critical Patch Update Advisory - October 2014&lt;/a&gt; (24 fixes / 8.0 max score)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujul2014.html#AppendixMSQL" target="_blank" title="Oracle CPU 2014-07"&gt;Oracle Critical Patch Update Advisory - July 2014&lt;/a&gt; (10 fixes / 6.5 max score)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuapr2014.html#AppendixMSQL" target="_blank" title="Oracle CPU 2014-04"&gt;Oracle Critical Patch Update Advisory - April 2014&lt;/a&gt; (14 fixes / 6.5 max score)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujan2014.html#AppendixMSQL" target="_blank" title="Oracle CPU 2014-01"&gt;Oracle Critical Patch Update Advisory - January 2014&lt;/a&gt; (18 fixes / 10.0 max score)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuoct2013.html#AppendixMSQL" target="_blank" title="Oracle CPU 2013-10"&gt;Oracle Critical Patch Update Advisory - October 2013&lt;/a&gt; (8 fixes / 8.5 max score)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujul2013.html#AppendixMSQL" target="_blank" title="Oracle CPU 2013-07"&gt;Oracle Critical Patch Update Advisory - July 2013&lt;/a&gt; (18 fixes / 6.8 max score)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuapr2013.html#AppendixMSQL" target="_blank" title="Oracle CPU 2013-04"&gt;Oracle Critical Patch Update Advisory - April 2013&lt;/a&gt; (25 fixes / 6.8 max score)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujan2013.html#AppendixMSQL" target="_blank" title="Oracle CPU 2013-01"&gt;Oracle Critical Patch Update Advisory - January 2013&lt;/a&gt; (18 fixes / 9.0 max score)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuoct2012.html#AppendixMSQL" target="_blank" title="Oracle CPU 2012-10"&gt;Oracle Critical Patch Update Advisory - October 2012&lt;/a&gt; (15 fixes / 9.0 max score)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujul2012.html#AppendixMSQL" target="_blank" title="Oracle CPU 2012-07"&gt;Oracle Critical Patch Update Advisory - July 2012&lt;/a&gt; (6 fixes / 6.8 max score)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuapr2012.html#AppendixMSQL" target="_blank" title="Oracle CPU 2012-04"&gt;Oracle Critical Patch Update Advisory - April 2012&lt;/a&gt; (6 fixes / 6.8 max score)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujan2012.html#AppendixMSQL" target="_blank" title="Oracle CPU 2012-01"&gt;Oracle Critical Patch Update Advisory - January 2012&lt;/a&gt; (27 fixes / 5.5 max score)&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="redhatcentos-vulnerabilities-by-cve-name"&gt;RedHat/CentOS vulnerabilities by CVE name&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://access.redhat.com/security/cve/#/?q=mysql" target="_blank" title="Red Hat vulnerabilities by CVE name for MySQL"&gt;Red Hat vulnerabilities by CVE name for MySQL&lt;/a&gt;&lt;/p&gt;</description></item><item><title>MariaDB Security Risk Matrix</title><link>https://www.fromdual.com/mariadb-security-risk-matrix/index.php</link><pubDate>Tue, 25 Feb 2020 15:49:45 +0000</pubDate><author>oli.sennhauser@fromdual.com (Oli Sennhauser)</author><guid>https://www.fromdual.com/mariadb-security-risk-matrix/index.php</guid><description>&lt;?php

$fromdual_base = dirname(dirname($_SERVER['SCRIPT_FILENAME']));
$fromdual_file = $fromdual_base . '/php/mariadb-vulnerabilities.inc';
include($fromdual_file);

// See also /node/1422 for Edit!

?&gt;</description></item></channel></rss>