Deploy autonomous AI agents that reason, exploit, and validate complex vulnerability chains — not another scanner, an agentic system that thinks like a senior pentester.
CVE-2016-6662 is a low severity vulnerability with a CVSS score of 0.0. Exploits are available; patches have been released and should be applied urgently.
Very high probability of exploitation in the next 30 days
EPSS predicts the probability of exploitation in the next 30 days based on real-world threat data, complementing CVSS severity scores with actual risk assessment.
Oracle MySQL through 5.5.52, 5.6.x through 5.6.33, and 5.7.x through 5.7.15; MariaDB before 5.5.51, 10.0.x before 10.0.27, and 10.1.x before 10.1.17; and Percona Server before 5.5.51-38.1, 5.6.x before 5.6.32-78.0, and 5.7.x before 5.7.14-7 allow local users to create arbitrary configurations and bypass certain protection mechanisms by setting general_log_file to a my.cnf configuration. NOTE: this can be leveraged to execute arbitrary code with root privileges by setting malloc_lib. NOTE: the affected MySQL version information is from Oracle's October 2016 CPU. Oracle has not commented on third-party claims that the issue was silently patched in MySQL 5.5.52, 5.6.33, and 5.7.15.
| Vendor | Product |
|---|---|
| Redhat | Enterprise Linux Server Tus |
| Oracle | MySQL |
| Redhat | Enterprise Linux Server Aus |
| Redhat | Enterprise Linux Server |
| Redhat | Enterprise Linux Server Eus |
| Redhat | Enterprise Linux Desktop |
| Mariadb | Mariadb |
| Debian | Debian Linux |
| Redhat | Enterprise Linux Workstation |
| Redhat | Openstack |
And 2 more...
Please cite this page when referencing data from Strobes VI. Proper attribution helps support our vulnerability intelligence research.