{"vulnerability": "cve-2016-6662", "sightings": [{"uuid": "c2a1d726-d0e1-4f1b-86da-51d73a7b5a7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-6662", "type": "seen", "source": "MISP/d17bd6ef-d68b-317b-ac33-cdbc44c5fc57", "content": "", "creation_timestamp": "2025-08-31T03:12:56.000000Z"}, {"uuid": "0e2678f0-40c7-47ee-8626-36fa947bd410", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-6662", "type": "seen", "source": "Telegram/DkL_NIHCHB4-xzn1YeEvJfXnLJ8DDUa2bCl4NS6tvvBlUxYs", "content": "", "creation_timestamp": "2025-08-22T13:09:00.000000Z"}, {"uuid": "e32f4dd9-fbb4-411c-8253-95aaef3f5ca6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-6662", "type": "published-proof-of-concept", "source": "Telegram/8CjJHwVe8QLK-yPjetYFX8pfbAd-2HPNkq1FPciguwBfzDXl", "content": "", "creation_timestamp": "2025-08-22T12:58:26.000000Z"}, {"uuid": "93127e90-0991-4026-8af5-02b47d53bf79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-6662", "type": "published-proof-of-concept", "source": "Telegram/MIjA0sDSff1059OPorvMQlmJH_PdTesSY7iVcgfG5UokArrp", "content": "", "creation_timestamp": "2025-08-20T20:53:54.000000Z"}, {"uuid": "4fe50651-8c3c-4be7-b4d3-02430883ee5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-6662", "type": "published-proof-of-concept", "source": "https://t.me/FullDisclosure/96", "content": "Re: CVE-2016-6662 - MySQL Remote Root Code Execution / Privilege Escalation ( 0day )\nhttps://goo.gl/c10AyL", "creation_timestamp": "2016-09-27T20:05:27.000000Z"}, {"uuid": "e6b322c6-b733-4977-a54b-3725537e17ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-6662", "type": "published-proof-of-concept", "source": "https://t.me/FullDisclosure/90", "content": "Re: CVE-2016-6662 - MySQL Remote Root Code Execution / Privilege Escalation ( 0day )\nhttps://goo.gl/zZupcT", "creation_timestamp": "2016-09-27T19:42:22.000000Z"}, {"uuid": "5fbc634e-fe81-437b-aebb-81fe87c3998b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-6662", "type": "published-proof-of-concept", "source": "https://t.me/FullDisclosure/61", "content": "Re: CVE-2016-6662 - MySQL Remote Root Code Execution / Privilege Escalation ( 0day )\nhttps://goo.gl/dKdja6", "creation_timestamp": "2016-09-15T20:05:38.000000Z"}, {"uuid": "dcacbc90-a8d4-48cc-820e-869b35a7e6d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-6662", "type": "published-proof-of-concept", "source": "https://t.me/FullDisclosure/50", "content": "CVE-2016-6662 - MySQL Remote Root Code Execution / Privilege Escalation ( 0day )\nhttp://goo.gl/u9r2X8", "creation_timestamp": "2016-09-12T15:54:26.000000Z"}, {"uuid": "5c1c38cf-f82e-4f69-abf5-852f536377c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-6662", "type": "published-proof-of-concept", "source": "https://t.me/FullDisclosure/97", "content": "Re: CVE-2016-6662 - MySQL Remote Root Code Execution / Privilege Escalation ( 0day )\nhttps://goo.gl/IY6mv1", "creation_timestamp": "2016-09-27T20:05:57.000000Z"}, {"uuid": "a58b5b5b-d044-4a6a-a3e2-d807ecf0f90f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-6662", "type": "published-proof-of-concept", "source": "https://t.me/ctodaily/28", "content": "\u0423 \u043c\u0435\u043d\u044f \u0435\u0441\u0442\u044c \u043b\u0438\u0447\u043d\u0430\u044f \u043d\u0435\u043f\u0440\u0438\u044f\u0437\u043d\u044c \u043a MySQL. \u041f\u0440\u0438\u0447\u0438\u043d\u0430 \u043d\u0435 \u0432 \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u044b\u0445 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430\u0445 - \u044d\u0442\u043e \u0438\u0441\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u043c\u043e\u0449\u043d\u044b\u0439 \u0441\u043e\u0444\u0442; \u043c\u043d\u043e\u0433\u0438\u0435 \u043a\u0440\u0443\u0442\u044b\u0435 \u0442\u0435\u0445\u043d\u0430\u0440\u0438 \u0434\u0435\u043b\u0430\u044e\u0442 \u0431\u0430\u0437\u044b \u0438\u043c\u0435\u043d\u043d\u043e \u043d\u0430 \u043d\u0435\u043c. \n\n\u041f\u0440\u0438\u0447\u0438\u043d\u0430 - \u0432 \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0430\u0446\u0438\u0438. \u0412 \u044d\u0442\u043e\u043c \u043d\u0435\u0443\u043c\u0435\u043d\u0438\u0438 \u0441\u0444\u043e\u0440\u043c\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u043c\u044b\u0441\u043b\u044c \u043d\u0435 \u0440\u0430\u0441\u0442\u0435\u043a\u0430\u044f\u0441\u044c \u043d\u0430 10 \u0441\u0442\u0440\u0430\u043d\u0438\u0446. \u0412 \u043d\u0435\u0443\u043c\u0435\u043d\u0438\u0438 \u043e\u0442\u0434\u0435\u043b\u0438\u0442\u044c \u043e\u0434\u0438\u043d \u0440\u0430\u0437\u0434\u0435\u043b \u043e\u0442 \u0434\u0440\u0443\u0433\u043e\u0433\u043e. \n\n\u041f\u043e\u0434\u0440\u043e\u0441\u0442\u043a\u043e\u043c \u044f \u0447\u0438\u0442\u0430\u043b The FreeBSD Handbook. \u042d\u0442\u043e \u043f\u0440\u0438\u043c\u0435\u0440 \u0438\u0434\u0435\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u043e\u0433\u043e \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0430 \u0441\u0432\u043e\u0435\u0433\u043e \u0444\u043e\u0440\u043c\u0430\u0442\u0430. \u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u044e \u043f\u043e\u0447\u0438\u0442\u0430\u0442\u044c, \u0434\u0430\u0436\u0435 \u0435\u0441\u043b\u0438 \u0432\u044b \u043d\u0435 \u0442\u0435\u0445\u043d\u0430\u0440\u044c. \u041f\u0440\u043e\u0441\u0442\u043e \u043e\u0446\u0435\u043d\u0438\u0442\u0435 \u043b\u0451\u0433\u043a\u043e\u0441\u0442\u044c \u0441\u043b\u043e\u0432\u0430 \u0438 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u043e \u043f\u043e\u0434\u0433\u043e\u0442\u043e\u0432\u043a\u0438 \u0442\u0435\u043a\u0441\u0442\u0430. \nhttps://www.freebsd.org/doc/handbook/\n\n\u0414\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0430\u0446\u0438\u044f PostgreSQL - \u0438\u0437 \u0442\u043e\u0439 \u0436\u0435 \u043b\u0438\u0433\u0438. \nhttps://www.postgresql.org/docs/9.5/static/index.html\n\n\u0418\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u043e, \u0447\u0442\u043e \u043b\u044e\u0431\u043e\u0432\u044c \u043a \u044d\u043b\u0435\u0433\u0430\u043d\u0442\u043d\u043e\u0441\u0442\u0438 \u0438 \u043a\u0440\u0430\u0441\u043e\u0442\u0435 \u043d\u0435 \u043e\u0431\u044f\u0437\u0430\u0442\u0435\u043b\u044c\u043d\u043e \u0432\u0435\u0434\u0451\u0442 \u043a \u043a\u043e\u043c\u043c\u0435\u0440\u0447\u0435\u0441\u043a\u043e\u043c\u0443 \u0443\u0441\u043f\u0435\u0445\u0443. \u0418 \u043a\u0430\u043a \u043f\u0440\u0435\u043a\u0440\u0430\u0441\u043d\u043e, \u0447\u0442\u043e \u0435\u0441\u0442\u044c \u0438\u0441\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u044f \u0432\u0440\u043e\u0434\u0435 Apple, \u0433\u0434\u0435 \u043e\u043d\u0438 \u0441\u043e\u0447\u0435\u0442\u0430\u044e\u0442\u0441\u044f. \n\n\u041d\u0430\u0432\u0435\u044f\u043d\u043e \u0432\u043e\u0442 \u044d\u0442\u0438\u043c \u0441\u043f\u0438\u0441\u043a\u043e\u043c \u0441\u0432\u0435\u0436\u0438\u0445 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 MySQL. \nhttp://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html", "creation_timestamp": "2016-09-12T18:20:36.000000Z"}, {"uuid": "f46a7e73-6aa6-4769-bcdb-7fb132672c45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-6662", "type": "published-proof-of-concept", "source": "Telegram/moqY6cW5VnKV_c19yFzOoCThPzN6rcBfQ0zDhyqMg7kJYfg", "content": "", "creation_timestamp": "2025-08-21T03:00:08.000000Z"}, {"uuid": "679c404c-4a64-4491-8c8e-8c847df7faa2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-6662", "type": "published-proof-of-concept", "source": "https://t.me/HackerOne/341", "content": "http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html", "creation_timestamp": "2016-10-20T22:44:05.000000Z"}, {"uuid": "1fc1cc11-0502-490e-b96f-4e810b2f7649", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-6662", "type": "seen", "source": "https://t.me/itsecalert/41", "content": "\u26a0\ufe0f MySQL - Remote exec, multiple conditions needed - CVE-2016-6662?: . The vulnerability affects MySQL servers in all version branches (5.7, 5.6, and 5.5) including the latest versions, and can allow attackers to (remotely) inject malicious settings into MySQL \nconfiguration files (my.cnf) leading to critical consequences. (severity: \ud83d\udd39medium) Further Info: http://yt.gl/mysqle5\n#vulnerability #severitymedium #linux \n#mysql", "creation_timestamp": "2016-09-20T12:00:32.000000Z"}]}