尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | MySQL server CVE-2016-6662 patch playbook | https://github.com/konstantin-kelemen/mysqld_safe-CVE-2016-6662-patch | POC详情 |
| 2 | Simple ansible playbook to patch mysql servers against CVE-2016-6662 | https://github.com/meersjo/ansible-mysql-cve-2016-6662 | POC详情 |
| 3 | research CVE-2016-6662 | https://github.com/KosukeShimofuji/CVE-2016-6662 | POC详情 |
| 4 | 0ldSQL_MySQL_RCE_exploit.py (ver. 1.0) (CVE-2016-6662) MySQL Remote Root Code Execution / Privesc PoC Exploit For testing purposes only. Do no harm. | https://github.com/Ashrafdev/MySQL-Remote-Root-Code-Execution | POC详情 |
| 5 | None | https://github.com/boompig/cve-2016-6662 | POC详情 |
| 6 | From SQL injection to root shell with CVE-2016-6662 by MaYaSeVeN | https://github.com/MAYASEVEN/CVE-2016-6662 | POC详情 |
| 7 | This lab dedicated to learning penetration testing skill with CVE-2016-6662: MySQL Remote Root Code Execution | https://github.com/LSQUARE14/SQL_to_RCE_Lab | POC详情 |
| 8 | CVE-2016-6662, tapi versi lab ala Kanya. Dari SQL Injection receh → bisa jadi full server takeover. Cocok buat latihan dan flexing di forum, jangan dipake ke server orang. | https://github.com/kanyaars/CVE-2016-6662 | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论