{"vulnerability": "cve-2016-5616", "sightings": [{"uuid": "5aad13c7-ddbb-4a13-ada4-5b8be20004c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-5616", "type": "seen", "source": "https://t.me/itsecalert/50", "content": "\u26a0\ufe0f MySQL / MariaDB / PerconaDB - Privilege Escalation / Race Condition : CVE-2016-6663 / OCVE-2016-5616 \n\nThe vulnerability can allow a local system user with access to the affected \ndatabase in the context of a low-privileged account (CREATE/INSERT/SELECT grants) \nto escalate their privileges and execute arbitrary code as the database system \nuser (typically 'mysql'). \nSuccessful exploitation would allow an attacker to gain access to all of the \ndatabases stored on the affected database server.\n\n (severity: \ud83d\udd38 High ) Further Info: http://mcaf.ee/3fgpwd\n#severityhigh #linux #MySQL  #MariaDB  #PerconaDB #alert #patchthis #2016 #warning #privilegeescalation #wedsday", "creation_timestamp": "2016-11-02T11:25:24.000000Z"}, {"uuid": "5bd5b600-e6a5-4877-9a6a-994ecbb755d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-5616", "type": "published-proof-of-concept", "source": "https://t.me/FullDisclosure/222", "content": "MySQL / MariaDB / PerconaDB - Privilege Escalation / Race Condition Exploit [CVE-2016-6663 / OCVE-2016-5616]\nhttps://goo.gl/5ggSba", "creation_timestamp": "2016-11-02T00:41:01.000000Z"}]}