{"uuid": "b87ffbd4-ca8a-460c-97fd-98c89eef8995", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-6663", "type": "exploited", "source": "https://t.me/webpwn/96", "content": "\u0412 \u0441\u0435\u0442\u0438 \u043f\u043e\u044f\u0432\u0438\u043b\u0441\u044f \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u043f\u043e\u0434 MySQL / MariaDB / PerconaDB - \u043f\u043e\u0434\u043d\u044f\u0442\u0438\u0435 \u043f\u0440\u0438\u0432\u0435\u043b\u0435\u0433\u0438\u0439 \u0434\u043e root'\u0430 (\u043e\u043f\u044f\u0442\u044c race condition, \u043e\u0433\u0430).\nhttp://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html\nhttps://www.exploit-db.com/exploits/40679/", "creation_timestamp": "2016-11-02T08:09:56.000000Z"}