Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | MySQL server CVE-2016-6662 patch playbook | https://github.com/konstantin-kelemen/mysqld_safe-CVE-2016-6662-patch | POC Details |
| 2 | Simple ansible playbook to patch mysql servers against CVE-2016-6662 | https://github.com/meersjo/ansible-mysql-cve-2016-6662 | POC Details |
| 3 | research CVE-2016-6662 | https://github.com/KosukeShimofuji/CVE-2016-6662 | POC Details |
| 4 | 0ldSQL_MySQL_RCE_exploit.py (ver. 1.0) (CVE-2016-6662) MySQL Remote Root Code Execution / Privesc PoC Exploit For testing purposes only. Do no harm. | https://github.com/Ashrafdev/MySQL-Remote-Root-Code-Execution | POC Details |
| 5 | None | https://github.com/boompig/cve-2016-6662 | POC Details |
| 6 | From SQL injection to root shell with CVE-2016-6662 by MaYaSeVeN | https://github.com/MAYASEVEN/CVE-2016-6662 | POC Details |
| 7 | This lab dedicated to learning penetration testing skill with CVE-2016-6662: MySQL Remote Root Code Execution | https://github.com/LSQUARE14/SQL_to_RCE_Lab | POC Details |
| 8 | CVE-2016-6662, tapi versi lab ala Kanya. Dari SQL Injection receh → bisa jadi full server takeover. Cocok buat latihan dan flexing di forum, jangan dipake ke server orang. | https://github.com/kanyaars/CVE-2016-6662 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet