Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | PostgreSQL | 17 ~ 17.3 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | WebSocket and SQL Injection Exploit Script | https://github.com/soltanali0/CVE-2025-1094-Exploit | POC Details |
| 2 | CVE-2025-1094 Exploit SQL Injection to RCE via WebSocket in PostgreSQL | https://github.com/shacojx/CVE-2025-1094-Exploit | POC Details |
| 3 | None | https://github.com/ishwardeepp/CVE-2025-1094-PoC-Postgre-SQLi | POC Details |
| 4 | It is an input sanitization flaw caused by an encoding mismatch, allowing crafted input to bypass filters. If a server is vulnerable, an attacker can inject malicious SQL that the backend executes. | https://github.com/aninfosec/CVE-2025-1094 | POC Details |
| 5 | CVE-2025-1094 | https://github.com/B1ack4sh/Blackash-CVE-2025-1094 | POC Details |
| 6 | None | https://github.com/PinkArmor/CVE-2025-1094-Lab-Setup | POC Details |
| 7 | CVE-2025-1094 | https://github.com/Ashwesker/Blackash-CVE-2025-1094 | POC Details |
| 8 | CVE-2025-1094 | https://github.com/Ashwesker/Ashwesker-CVE-2025-1094 | POC Details |
| 9 | 🔒 CVE-2025-1094 PostgreSQL Multi-byte SQL Injection Demo | Educational security research project with full documentation | https://github.com/Nguyen-Van-Gia-Binh/Fcode-Security-Demo | POC Details |
No public POC found.
Login to generate AI POCNo comments yet