{"vulnerability": "CVE-2025-1094", "sightings": [{"uuid": "a6cb19da-35f1-4d31-9c88-d84fa088889a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/opsmatters.bsky.social/post/3lku5r33lx72t", "content": "", "creation_timestamp": "2025-03-21T02:22:46.492021Z"}, {"uuid": "fba5a68a-5fb7-431c-8e0c-ded5be7956b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:11:06.000000Z"}, {"uuid": "fce3f316-27b8-480a-8dd4-653ff96cf67b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3ljhzhpshtc2o", "content": "", "creation_timestamp": "2025-03-03T13:08:53.177626Z"}, {"uuid": "09c03ea4-617b-41ca-a3e8-1feb7b01f077", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3ljfk3rqdls2f", "content": "", "creation_timestamp": "2025-03-02T13:28:23.557892Z"}, {"uuid": "f204065d-e02d-4b3c-8c9b-81df58ba9234", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/opsmatters.bsky.social/post/3lk3cy35tmy23", "content": "", "creation_timestamp": "2025-03-11T05:19:36.634679Z"}, {"uuid": "a02eb8dd-8c00-4407-a3d7-b6fb86d3d650", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/catc0n.bsky.social/post/3li2ypsjlts2x", "content": "", "creation_timestamp": "2025-02-13T15:25:39.226504Z"}, {"uuid": "d2a14c08-0035-40c8-9e8d-a25d0a5e3da8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/catc0n.bsky.social/post/3li2ys2fv7s2x", "content": "", "creation_timestamp": "2025-02-13T15:26:53.912756Z"}, {"uuid": "1b7a4d40-11ec-4b3b-a00a-dec92c70e11e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/catc0n.bsky.social/post/3li2ysfl7s22x", "content": "", "creation_timestamp": "2025-02-13T15:27:05.608976Z"}, {"uuid": "8a8b5c1f-fc41-481d-b370-62f3117a228a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/catc0n.bsky.social/post/3li2yujgp3s2x", "content": "", "creation_timestamp": "2025-02-13T15:28:16.723192Z"}, {"uuid": "ea6c327d-dc47-4c9a-bdc5-a4fe4904db02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-1094", "type": "seen", "source": "https://infosec.exchange/users/catc0n/statuses/113997296172337824", "content": "", "creation_timestamp": "2025-02-13T15:31:36.450094Z"}, {"uuid": "439cff52-391e-40e7-a157-c101535b55b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://infosec.exchange/users/catc0n/statuses/113997300008493846", "content": "", "creation_timestamp": "2025-02-13T15:32:35.458394Z"}, {"uuid": "0292fc5d-f73c-47e4-9c64-1bf80929def1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://infosec.exchange/users/catc0n/statuses/113997303178922204", "content": "", "creation_timestamp": "2025-02-13T15:33:23.404182Z"}, {"uuid": "4952b7cd-8722-4f16-9acf-ebe9245a0ff6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://infosec.exchange/users/catc0n/statuses/113997306001643223", "content": "", "creation_timestamp": "2025-02-13T15:34:06.445050Z"}, {"uuid": "81cba2dd-9ee7-451d-98bb-80411cb4f470", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://infosec.exchange/users/catc0n/statuses/113997307930863327", "content": "", "creation_timestamp": "2025-02-13T15:34:36.076619Z"}, {"uuid": "53f923f1-ea87-49aa-ad05-a16869481e5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/stephenfewer.bsky.social/post/3li32xf5dnc2r", "content": "", "creation_timestamp": "2025-02-13T16:05:43.626652Z"}, {"uuid": "01118a96-f828-496b-8169-eeb9bddbcd33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/stephenfewer.bsky.social/post/3li32xg6l4k2r", "content": "", "creation_timestamp": "2025-02-13T16:05:45.055417Z"}, {"uuid": "6627d3dc-2eb2-471f-8b91-fdc4eb09ad68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/stephenfewer.bsky.social/post/3li32xg6l4l2r", "content": "", "creation_timestamp": "2025-02-13T16:05:46.472580Z"}, {"uuid": "77781b77-0932-4f04-ad02-ecff9c2be1a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/rapid7.com/post/3li33h4fmkk2c", "content": "", "creation_timestamp": "2025-02-13T16:14:29.002799Z"}, {"uuid": "cbf3da35-fe07-445d-9f35-506a3052c0b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/rapid7.com/post/3li33h4fqhk2c", "content": "", "creation_timestamp": "2025-02-13T16:14:30.389648Z"}, {"uuid": "e51abb48-4223-4681-9eb5-ca69a1604e18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/rapid7.com/post/3li33h4frgs2c", "content": "", "creation_timestamp": "2025-02-13T16:14:31.731477Z"}, {"uuid": "4af5f36d-a948-4190-9597-ba6e310536ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3ljxo7sh5qc2f", "content": "", "creation_timestamp": "2025-03-09T18:30:08.826317Z"}, {"uuid": "39325524-0ddd-4ebb-968c-7ba3aa56ebbb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-1094", "type": "seen", "source": "https://bsky.app/profile/PostgreSQL.activitypub.awakari.com.ap.brid.gy/post/3li4dsdtti5a2", "content": "", "creation_timestamp": "2025-02-14T04:16:41.149465Z"}, {"uuid": "520b60cc-f9fe-4233-aebf-b3a7cb00639b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113996724606453819", "content": "", "creation_timestamp": "2025-02-13T13:06:15.056837Z"}, {"uuid": "8fdae24e-7953-4bdb-b3ce-20f4ee99f58f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li2rgyzyqz2z", "content": "", "creation_timestamp": "2025-02-13T13:15:27.027513Z"}, {"uuid": "e34b4d05-e8f2-44d3-83d3-3467f60696c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li2vumatfd2e", "content": "", "creation_timestamp": "2025-02-13T14:34:40.256846Z"}, {"uuid": "820b28d9-5e02-4df3-96bf-8ef7a9ff5d4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113997126074656378", "content": "", "creation_timestamp": "2025-02-13T14:48:21.282403Z"}, {"uuid": "d0af0999-9fe5-4da6-8599-2f94e94d51a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/catc0n.bsky.social/post/3li2yt4p5jk2x", "content": "", "creation_timestamp": "2025-02-13T15:27:30.047537Z"}, {"uuid": "3d92f010-0bed-4ed7-a984-b1573d588382", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/catc0n.bsky.social/post/3li2ytzor4k2x", "content": "", "creation_timestamp": "2025-02-13T15:28:00.405549Z"}, {"uuid": "d0385602-beb3-49e6-b86b-8ea8af5a7986", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3li5gdjenst2a", "content": "", "creation_timestamp": "2025-02-14T14:34:38.979925Z"}, {"uuid": "be7a7431-b48a-4620-aecc-21272ec68a06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/mynameisv.bsky.social/post/3li5gsbec5c23", "content": "", "creation_timestamp": "2025-02-14T14:42:55.660473Z"}, {"uuid": "cf823f7e-dba5-490b-850e-fbf38d9e0f64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/campuscodi.risky.biz/post/3li5hl2vxsc2f", "content": "", "creation_timestamp": "2025-02-14T14:56:46.780337Z"}, {"uuid": "3df2873b-01fc-432e-9315-15290839e6a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://mstdn.ca/users/rfwaveio/statuses/114002823202175367", "content": "", "creation_timestamp": "2025-02-14T14:57:17.255630Z"}, {"uuid": "9f40a955-c5ad-4667-8c45-9cc24ffcc9a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/aakl.bsky.social/post/3li36t7u6y22p", "content": "", "creation_timestamp": "2025-02-13T17:14:56.791985Z"}, {"uuid": "d5e0894b-2c1b-4938-bef2-ce7ee3e0c2d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3li3cb6bsrw2i", "content": "", "creation_timestamp": "2025-02-13T18:16:25.789089Z"}, {"uuid": "f42a8419-28b9-41ef-ae89-551076227c4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-1094", "type": "seen", "source": "https://infosec.exchange/users/edwardk/statuses/113997983576466350", "content": "", "creation_timestamp": "2025-02-13T18:26:25.281189Z"}, {"uuid": "68c54fc4-114f-49a0-aeb3-d3411f1b9345", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://threatintel.cc/2025/02/13/cve-postgresql-psql-sql-injection.html", "content": "", "creation_timestamp": "2025-02-13T17:26:11.000000Z"}, {"uuid": "ce77652f-999f-4ef2-abea-4bc70a87c877", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3li4jueysxk2m", "content": "", "creation_timestamp": "2025-02-14T06:05:05.617088Z"}, {"uuid": "ba90d901-3e39-4af7-bb50-702a2567c939", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3li4juf4fuw2n", "content": "", "creation_timestamp": "2025-02-14T06:05:06.092258Z"}, {"uuid": "fe45a106-f2cf-4d44-8c36-5a3821b9a6fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3li4lxescqc2h", "content": "", "creation_timestamp": "2025-02-14T06:42:33.572538Z"}, {"uuid": "0fb146b9-7f36-4b00-98a1-a08600b75cb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/matricedigitale.bsky.social/post/3li4neaooye2i", "content": "", "creation_timestamp": "2025-02-14T07:07:39.432923Z"}, {"uuid": "317ade20-21d7-46d3-bb85-5d4ed7a36a35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/rajsamani.bsky.social/post/3li4poo3pw22y", "content": "", "creation_timestamp": "2025-02-14T07:49:17.439459Z"}, {"uuid": "8882a95b-7f27-45d6-848e-7db1bc688657", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://thehackernews.com/2025/02/postgresql-vulnerability-exploited.html", "content": "", "creation_timestamp": "2025-02-14T04:03:00.000000Z"}, {"uuid": "9a050167-f8a5-488e-b22c-153aec6ed48c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3li553alhks2v", "content": "", "creation_timestamp": "2025-02-14T11:49:00.530039Z"}, {"uuid": "3b22f8f5-2060-46d1-8acb-92943c940d48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://infosec.exchange/users/jbhall56/statuses/114002377964407692", "content": "", "creation_timestamp": "2025-02-14T13:03:58.431410Z"}, {"uuid": "d09aba33-f166-45b6-9eac-d752264544d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/jbhall56.bsky.social/post/3li5bbm6rj225", "content": "", "creation_timestamp": "2025-02-14T13:04:06.651531Z"}, {"uuid": "1d824c78-7a92-41d9-bc74-1bec3aaebb12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://infosec.exchange/users/jbhall56/statuses/114008420002784130", "content": "", "creation_timestamp": "2025-02-15T14:40:32.539800Z"}, {"uuid": "e09ab8c1-c73a-4563-9d1c-fadc337dfa6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/empist.bsky.social/post/3li62nbmpec2w", "content": "", "creation_timestamp": "2025-02-14T20:38:02.368747Z"}, {"uuid": "56f357cb-ef66-4940-bb5d-d72cd35f63b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-1094", "type": "seen", "source": "https://bsky.app/profile/PostgreSQL.activitypub.awakari.com.ap.brid.gy/post/3li63gzvwwwi2", "content": "", "creation_timestamp": "2025-02-14T20:52:33.959731Z"}, {"uuid": "f98f861e-1a98-4680-9cab-b5cc2517cf72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3li63y67uoy24", "content": "", "creation_timestamp": "2025-02-14T21:01:59.872903Z"}, {"uuid": "9b3b1ebc-0978-4d23-91d7-2c48751a8443", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/ajsdecepida.bsky.social/post/3li6h7jb2zk27", "content": "", "creation_timestamp": "2025-02-15T00:22:57.702634Z"}, {"uuid": "167d3d92-b26a-4456-a26a-af8c9eaacd18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/royans.bsky.social/post/3li7bchrv432r", "content": "", "creation_timestamp": "2025-02-15T08:09:54.427300Z"}, {"uuid": "860c2a9f-9349-4078-b2b8-78b0e75028c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/jussimetso.com/post/3li7kcgw3i22y", "content": "", "creation_timestamp": "2025-02-15T10:50:58.102351Z"}, {"uuid": "e253b7b0-588a-4012-9e90-4b7ab37506c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/r-blueteamsec.bsky.social/post/3li7kj6ayga2u", "content": "", "creation_timestamp": "2025-02-15T10:54:42.270161Z"}, {"uuid": "6f291329-7048-4874-8306-e4e45761fd41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/jbhall56.bsky.social/post/3li7x575itk25", "content": "", "creation_timestamp": "2025-02-15T14:40:40.230119Z"}, {"uuid": "d28d48c4-63d9-4cfd-a757-4f8ea76dfd7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/Whiskeyomega.cupoftea.social.ap.brid.gy/post/3liagwk2dace2", "content": "", "creation_timestamp": "2025-02-15T19:42:29.731814Z"}, {"uuid": "ae77bbfd-5208-437f-8c90-93883b7d8f4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/fredbrooker.witter.cz.ap.brid.gy/post/3liaoiqpgfho2", "content": "", "creation_timestamp": "2025-02-15T21:39:22.932222Z"}, {"uuid": "9c65852d-29c9-4ecf-abf0-35a50e15712e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/royans.bsky.social/post/3liaxb57jg62v", "content": "", "creation_timestamp": "2025-02-16T00:15:31.214117Z"}, {"uuid": "bdf4d6ee-3bc7-475e-be9c-c403060aa324", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3libdklo2ds2j", "content": "", "creation_timestamp": "2025-02-16T03:55:37.332031Z"}, {"uuid": "4eec3282-3ecd-4b22-9d3f-246c57b4af91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3litxvwktnt2a", "content": "", "creation_timestamp": "2025-02-23T13:47:43.896764Z"}, {"uuid": "4f4cd9d7-4292-4c53-bcf5-402c7bc8690f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/maik.io/post/3libxg7okdy2n", "content": "", "creation_timestamp": "2025-02-16T09:51:01.237846Z"}, {"uuid": "31f84aa3-c0fc-4f0f-8712-0c3d050d60a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://infosec.exchange/users/tomcat/statuses/114013581624577454", "content": "", "creation_timestamp": "2025-02-16T12:33:12.625181Z"}, {"uuid": "204170fa-b767-4f2b-9154-0bb9b4e97652", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3licosmu4f423", "content": "", "creation_timestamp": "2025-02-16T16:49:33.711820Z"}, {"uuid": "efba32ee-28d6-4854-b14e-96b6906783d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/cecallihelper.bsky.social/post/3liui36x3bc22", "content": "", "creation_timestamp": "2025-02-23T18:37:04.836577Z"}, {"uuid": "69529cb7-07c2-4da2-8766-42d3d93547e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3licpct7k6m2w", "content": "", "creation_timestamp": "2025-02-16T16:58:37.320641Z"}, {"uuid": "e6cb0ff6-70f7-4d2f-b3fc-6545ebd734db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/cybersecurity.page/post/3lihfbxfx2h2b", "content": "", "creation_timestamp": "2025-02-18T13:42:29.383407Z"}, {"uuid": "236d6f6a-d7b6-4ec1-9947-93fa0cad4912", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3liebvb6poc2y", "content": "", "creation_timestamp": "2025-02-17T08:03:44.707328Z"}, {"uuid": "ad6d817c-de7b-4677-b9ca-db0a0fa88787", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-0cbbcc54-2537dcbcd7677eb4", "content": "", "creation_timestamp": "2025-02-17T09:58:14.740618Z"}, {"uuid": "a4665106-3f48-4de2-be51-777eed22e90b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-1094", "type": "seen", "source": "https://bsky.app/profile/PostgreSQL.activitypub.awakari.com.ap.brid.gy/post/3lif3hrhnx6r2", "content": "", "creation_timestamp": "2025-02-17T15:41:37.562009Z"}, {"uuid": "3ad278d7-64d3-42b9-a035-414ba080c9b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3lif4ivcfos25", "content": "", "creation_timestamp": "2025-02-17T16:00:02.529312Z"}, {"uuid": "304c7277-65ac-472f-abfa-098823cd31a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3lif4jbotac25", "content": "", "creation_timestamp": "2025-02-17T16:00:15.537976Z"}, {"uuid": "4069793e-b1d3-48aa-87f0-f7d076d1983e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lifjzq2s6f2a", "content": "", "creation_timestamp": "2025-02-17T20:02:02.730349Z"}, {"uuid": "73f0257a-cc4d-4487-8f1d-ddfcf7f45304", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lifkmly4il2z", "content": "", "creation_timestamp": "2025-02-17T20:12:35.797849Z"}, {"uuid": "3e3777bb-b833-4b26-82f5-0f1efbe2d62b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-1094", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lifkmm3ek72u", "content": "", "creation_timestamp": "2025-02-17T20:12:36.464598Z"}, {"uuid": "c7e7c34a-124b-4a9e-b7aa-7f853590c7d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3lifmyi3rco25", "content": "", "creation_timestamp": "2025-02-17T20:55:02.549957Z"}, {"uuid": "420e86da-bf40-42e6-9925-067db375b3dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lifqqhuzod2f", "content": "", "creation_timestamp": "2025-02-17T22:02:08.405298Z"}, {"uuid": "46416f63-010a-4515-b8ef-00d48dfe1657", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-18T02:34:31.000000Z"}, {"uuid": "f6ee4dc7-4887-4f07-be96-40f8f525aa02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-1094", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3ligf7ae3ls2n", "content": "", "creation_timestamp": "2025-02-18T04:08:18.724267Z"}, {"uuid": "f08ce27b-e3b6-4732-a4f4-690be6373427", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3licvsdiysk2g", "content": "", "creation_timestamp": "2025-02-16T18:54:40.201818Z"}, {"uuid": "449dfa2c-ae13-4f28-82eb-86776ff4633a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/omo.bsky.social/post/3lidsd3cgg22p", "content": "", "creation_timestamp": "2025-02-17T03:25:08.650226Z"}, {"uuid": "ec7a334f-311c-4646-89d3-efa3ff7535b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lihj36sgs22n", "content": "", "creation_timestamp": "2025-02-18T14:50:17.847746Z"}, {"uuid": "2a290f99-a9af-4380-aed2-f36b6d16c4e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lii5us3tc22i", "content": "", "creation_timestamp": "2025-02-18T21:02:31.536684Z"}, {"uuid": "43bc890f-a5c9-4f7e-a6c7-b9e109d9288b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/unix-ninja.bsky.social/post/3lil5nsw25c2j", "content": "", "creation_timestamp": "2025-02-20T01:36:38.806613Z"}, {"uuid": "f1d518f9-96cd-4210-892e-91a4382a37c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3liisjng6q22i", "content": "", "creation_timestamp": "2025-02-19T03:12:06.808369Z"}, {"uuid": "0064d5ee-fbdb-458a-b20a-f24eaca9835b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lir6u5gnpq2x", "content": "", "creation_timestamp": "2025-02-22T11:14:00.929611Z"}, {"uuid": "7e449cd4-bef3-4c8f-8e0e-361f31d00ed3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3limstfuelt25", "content": "", "creation_timestamp": "2025-02-20T17:28:12.314944Z"}, {"uuid": "38babf12-8241-4d34-90bc-385aa603bd36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://gist.github.com/amitschendel/4315fb5c35b601d1337cfc3a5122ef56", "content": "", "creation_timestamp": "2025-03-10T12:50:35.000000Z"}, {"uuid": "5b90fd58-5bbe-4529-a090-10b34f4ad0f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/nixpkgssecuritychanges.gerbet.me/post/3lirf34s4fe2d", "content": "", "creation_timestamp": "2025-02-22T13:05:17.704074Z"}, {"uuid": "a3a0de60-8603-48a1-bd3e-c3a8f19513df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3liwdw3domc2r", "content": "", "creation_timestamp": "2025-02-24T12:27:53.805356Z"}, {"uuid": "dcfd7bb9-8165-4f15-ab2e-99de1b9c6662", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-10948", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lzugjmbfvo2l", "content": "", "creation_timestamp": "2025-09-28T02:17:34.391098Z"}, {"uuid": "1f431803-d07c-404f-b6d2-d7a3b2ab4b82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-10942", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115265421439271900", "content": "", "creation_timestamp": "2025-09-25T14:32:32.957958Z"}, {"uuid": "a6442fdf-52a4-4184-bc73-ea0a00653afe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-10948", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115265421439271900", "content": "", "creation_timestamp": "2025-09-25T14:32:33.079450Z"}, {"uuid": "9546f0d4-f2bb-422c-9e89-013b7d6d4eb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-10948", "type": "seen", "source": "https://bsky.app/profile/olhosdelobo.bsky.social/post/3lzu54moqzs2q", "content": "", "creation_timestamp": "2025-09-27T23:29:18.167282Z"}, {"uuid": "d449570b-a717-427f-82ac-444287a1c9fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-1094", "type": "seen", "source": "https://bsky.app/profile/securitycipher.bsky.social/post/3lj2zqft2eq2s", "content": "", "creation_timestamp": "2025-02-26T09:09:04.109549Z"}, {"uuid": "29a3ba18-7009-4b69-b44b-f068976ec86f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3ltw5ejbn3323", "content": "", "creation_timestamp": "2025-07-14T10:07:49.408645Z"}, {"uuid": "f91af3e4-0ef3-4d99-8237-d5e8c516e13d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "MISP/4d9e0694-2872-4bfc-8eee-f1ab846c5ab0", "content": "", "creation_timestamp": "2025-08-19T04:06:31.000000Z"}, {"uuid": "71ba0942-b8b5-4c26-9eea-6bdf2511599d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:04.000000Z"}, {"uuid": "4d4ff09b-159e-4b8d-9d8e-409d74c7bcec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://sploitus.com/exploit?id=7B12EAF5-EBAC-5606-A1F6-EDF65F8B168D", "content": "", "creation_timestamp": "2025-10-19T16:08:06.000000Z"}, {"uuid": "81f3de0c-2fd1-4fc2-bb1e-68690a1a537f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-10948", "type": "seen", "source": "https://bsky.app/profile/ruza.witter.cz.ap.brid.gy/post/3m35n3y3va5o2", "content": "", "creation_timestamp": "2025-10-14T11:35:26.447671Z"}, {"uuid": "3bf3f0d2-02c2-4151-8f1c-93a5bba97d11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "MISP/4d9e0694-2872-4bfc-8eee-f1ab846c5ab0", "content": "", "creation_timestamp": "2025-08-16T01:45:14.000000Z"}, {"uuid": "a8afa473-3a06-4180-8792-b31eb85edd7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/beyondtrust_pra_rs_unauth_rce.rb", "content": "", "creation_timestamp": "2025-02-17T16:51:25.000000Z"}, {"uuid": "f5b6eae0-c4de-423a-86df-d2823779248b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://gist.github.com/paulo-raca/8a16df3664952c9b185211298075c6ab", "content": "", "creation_timestamp": "2026-04-10T17:08:55.000000Z"}, {"uuid": "ffa01650-7d5a-4404-a44d-d1c948dd7c94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://gist.github.com/adampielak/20a1735062ea3db045061b518da57069", "content": "", "creation_timestamp": "2025-12-03T10:59:00.000000Z"}, {"uuid": "02a4f9f7-3f5c-4454-ad3f-86f7957bb349", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "published-proof-of-concept", "source": "Telegram/3DLF0Mv42zDQ9z6gIgLfJqznkdRPaQmP3DioJ9Oj28FPPS0", "content": "", "creation_timestamp": "2025-06-19T03:00:07.000000Z"}, {"uuid": "896a483a-8f20-4171-8d4d-763797247774", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "published-proof-of-concept", "source": "Telegram/xqWLoW48c4f5MbMxnjqNxxr1B4dZVPw1RPyF6evYNn220Xw", "content": "", "creation_timestamp": "2025-10-19T19:00:09.000000Z"}, {"uuid": "824f70cf-f479-4052-9f2d-767996b9b89d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "published-proof-of-concept", "source": "Telegram/dAy6HTzA5ImDlEhsqhRyCbj7LJDkpc8q7Xczm_pSmSLblNc", "content": "", "creation_timestamp": "2025-06-19T03:00:09.000000Z"}, {"uuid": "d33ac54a-dad3-4d73-8ff2-dba97962b84e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "published-proof-of-concept", "source": "https://t.me/hackingbra/268", "content": "CVE-2025-1094\n*\nRCE SQL Injection in PostgreSQL 14.15\n*\nexploit", "creation_timestamp": "2025-05-01T00:59:10.000000Z"}, {"uuid": "130204fa-e147-4f45-afd5-9e4d1e8b91cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/16957", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-1094 Exploit SQL Injection to RCE via WebSocket in PostgreSQL\nURL\uff1ahttps://github.com/shacojx/CVE-2025-1094-Exploit\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-05T04:06:47.000000Z"}, {"uuid": "c9a1f4e7-60a2-42fa-aa1a-a0bbc9171049", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4610", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1094\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-13T13:15:09.130\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://www.postgresql.org/support/security/CVE-2025-1094/\n2. http://www.openwall.com/lists/oss-security/2025/02/16/3\n3. https://lists.debian.org/debian-lts-announce/2025/02/msg00015.html", "creation_timestamp": "2025-02-16T23:12:10.000000Z"}, {"uuid": "92501db4-78fc-4bd0-816b-a86ac214f4aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4642", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1094\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Improper neutralization of quoting syntax in PostgreSQL libpq functions PQescapeLiteral(), PQescapeIdentifier(), PQescapeString(), and PQescapeStringConn() allows a database input provider to achieve SQL injection in certain usage patterns.  Specifically, SQL injection requires the application to use the function result to construct input to psql, the PostgreSQL interactive terminal.  Similarly, improper neutralization of quoting syntax in PostgreSQL command line utility programs allows a source of command line arguments to achieve SQL injection when client_encoding is BIG5 and server_encoding is one of EUC_TW or MULE_INTERNAL.  Versions before PostgreSQL 17.3, 16.7, 15.11, 14.16, and 13.19 are affected.\n\ud83d\udccf Published: 2025-02-13T15:31:25Z\n\ud83d\udccf Modified: 2025-02-16T21:31:43Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-1094\n2. https://lists.debian.org/debian-lts-announce/2025/02/msg00015.html\n3. https://www.postgresql.org/support/security/CVE-2025-1094\n4. http://www.openwall.com/lists/oss-security/2025/02/16/3", "creation_timestamp": "2025-02-17T00:24:47.000000Z"}, {"uuid": "2c2a08ee-215c-42e8-a825-b4fa4d59216d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4652", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1094\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Improper neutralization of quoting syntax in PostgreSQL libpq functions PQescapeLiteral(), PQescapeIdentifier(), PQescapeString(), and PQescapeStringConn() allows a database input provider to achieve SQL injection in certain usage patterns.  Specifically, SQL injection requires the application to use the function result to construct input to psql, the PostgreSQL interactive terminal.  Similarly, improper neutralization of quoting syntax in PostgreSQL command line utility programs allows a source of command line arguments to achieve SQL injection when client_encoding is BIG5 and server_encoding is one of EUC_TW or MULE_INTERNAL.  Versions before PostgreSQL 17.3, 16.7, 15.11, 14.16, and 13.19 are affected.\n\ud83d\udccf Published: 2025-02-13T15:31:25Z\n\ud83d\udccf Modified: 2025-02-16T21:31:43Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-1094\n2. https://lists.debian.org/debian-lts-announce/2025/02/msg00015.html\n3. https://www.postgresql.org/support/security/CVE-2025-1094\n4. http://www.openwall.com/lists/oss-security/2025/02/16/3", "creation_timestamp": "2025-02-17T00:26:22.000000Z"}, {"uuid": "19efa954-ff06-4080-9610-3fd2b92be61a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4688", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1094\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Improper neutralization of quoting syntax in PostgreSQL libpq functions PQescapeLiteral(), PQescapeIdentifier(), PQescapeString(), and PQescapeStringConn() allows a database input provider to achieve SQL injection in certain usage patterns.  Specifically, SQL injection requires the application to use the function result to construct input to psql, the PostgreSQL interactive terminal.  Similarly, improper neutralization of quoting syntax in PostgreSQL command line utility programs allows a source of command line arguments to achieve SQL injection when client_encoding is BIG5 and server_encoding is one of EUC_TW or MULE_INTERNAL.  Versions before PostgreSQL 17.3, 16.7, 15.11, 14.16, and 13.19 are affected.\n\ud83d\udccf Published: 2025-02-13T15:31:25Z\n\ud83d\udccf Modified: 2025-02-16T21:31:43Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-1094\n2. https://lists.debian.org/debian-lts-announce/2025/02/msg00015.html\n3. https://www.postgresql.org/support/security/CVE-2025-1094\n4. http://www.openwall.com/lists/oss-security/2025/02/16/3", "creation_timestamp": "2025-02-17T00:33:40.000000Z"}, {"uuid": "d8be6706-b6c8-490e-a7bc-08a2284c63cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4647", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1094\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Improper neutralization of quoting syntax in PostgreSQL libpq functions PQescapeLiteral(), PQescapeIdentifier(), PQescapeString(), and PQescapeStringConn() allows a database input provider to achieve SQL injection in certain usage patterns.  Specifically, SQL injection requires the application to use the function result to construct input to psql, the PostgreSQL interactive terminal.  Similarly, improper neutralization of quoting syntax in PostgreSQL command line utility programs allows a source of command line arguments to achieve SQL injection when client_encoding is BIG5 and server_encoding is one of EUC_TW or MULE_INTERNAL.  Versions before PostgreSQL 17.3, 16.7, 15.11, 14.16, and 13.19 are affected.\n\ud83d\udccf Published: 2025-02-13T15:31:25Z\n\ud83d\udccf Modified: 2025-02-16T21:31:43Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-1094\n2. https://lists.debian.org/debian-lts-announce/2025/02/msg00015.html\n3. https://www.postgresql.org/support/security/CVE-2025-1094\n4. http://www.openwall.com/lists/oss-security/2025/02/16/3", "creation_timestamp": "2025-02-17T00:25:52.000000Z"}, {"uuid": "e61cad42-635d-4407-b8ed-dfcac87b89c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4404", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1094\n\ud83d\udd25 CVSS Score: 8.1 (CVSS_V3)\n\ud83d\udd39 Description: Improper neutralization of quoting syntax in PostgreSQL libpq functions PQescapeLiteral(), PQescapeIdentifier(), PQescapeString(), and PQescapeStringConn() allows a database input provider to achieve SQL injection in certain usage patterns.  Specifically, SQL injection requires the application to use the function result to construct input to psql, the PostgreSQL interactive terminal.  Similarly, improper neutralization of quoting syntax in PostgreSQL command line utility programs allows a source of command line arguments to achieve SQL injection when client_encoding is BIG5 and server_encoding is one of EUC_TW or MULE_INTERNAL.  Versions before PostgreSQL 17.3, 16.7, 15.11, 14.16, and 13.19 are affected.\n\ud83d\udccf Published: 2025-02-13T15:31:25Z\n\ud83d\udccf Modified: 2025-02-14T00:30:44Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-1094\n2. https://lists.debian.org/debian-lts-announce/2025/02/msg00015.html\n3. https://www.postgresql.org/support/security/CVE-2025-1094", "creation_timestamp": "2025-02-14T01:16:53.000000Z"}, {"uuid": "687efd31-a3df-400e-8255-4bf2a851f367", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4612", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: GHSA-mhw9-x46c-v6q4\n\ud83d\udd25 CVSS Score: 8.1 (CVSS_V3)\n\ud83d\udd39 Description: Improper neutralization of quoting syntax in PostgreSQL libpq functions PQescapeLiteral(), PQescapeIdentifier(), PQescapeString(), and PQescapeStringConn() allows a database input provider to achieve SQL injection in certain usage patterns.  Specifically, SQL injection requires the application to use the function result to construct input to psql, the PostgreSQL interactive terminal.  Similarly, improper neutralization of quoting syntax in PostgreSQL command line utility programs allows a source of command line arguments to achieve SQL injection when client_encoding is BIG5 and server_encoding is one of EUC_TW or MULE_INTERNAL.  Versions before PostgreSQL 17.3, 16.7, 15.11, 14.16, and 13.19 are affected.\n\ud83d\udccf Published: 2025-02-13T15:31:25Z\n\ud83d\udccf Modified: 2025-02-16T21:31:43Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-1094\n2. https://lists.debian.org/debian-lts-announce/2025/02/msg00015.html\n3. https://www.postgresql.org/support/security/CVE-2025-1094\n4. http://www.openwall.com/lists/oss-security/2025/02/16/3", "creation_timestamp": "2025-02-17T00:19:06.000000Z"}, {"uuid": "83860355-a2bd-4d75-a52a-29d7705d5252", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4617", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: GHSA-mhw9-x46c-v6q4\n\ud83d\udd25 CVSS Score: 8.1 (CVSS_V3)\n\ud83d\udd39 Description: Improper neutralization of quoting syntax in PostgreSQL libpq functions PQescapeLiteral(), PQescapeIdentifier(), PQescapeString(), and PQescapeStringConn() allows a database input provider to achieve SQL injection in certain usage patterns.  Specifically, SQL injection requires the application to use the function result to construct input to psql, the PostgreSQL interactive terminal.  Similarly, improper neutralization of quoting syntax in PostgreSQL command line utility programs allows a source of command line arguments to achieve SQL injection when client_encoding is BIG5 and server_encoding is one of EUC_TW or MULE_INTERNAL.  Versions before PostgreSQL 17.3, 16.7, 15.11, 14.16, and 13.19 are affected.\n\ud83d\udccf Published: 2025-02-13T15:31:25Z\n\ud83d\udccf Modified: 2025-02-16T21:31:43Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-1094\n2. https://lists.debian.org/debian-lts-announce/2025/02/msg00015.html\n3. https://www.postgresql.org/support/security/CVE-2025-1094\n4. http://www.openwall.com/lists/oss-security/2025/02/16/3", "creation_timestamp": "2025-02-17T00:20:12.000000Z"}, {"uuid": "f9f3089c-7376-4352-a311-df4cf6baed00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4663", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1094\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Improper neutralization of quoting syntax in PostgreSQL libpq functions PQescapeLiteral(), PQescapeIdentifier(), PQescapeString(), and PQescapeStringConn() allows a database input provider to achieve SQL injection in certain usage patterns.  Specifically, SQL injection requires the application to use the function result to construct input to psql, the PostgreSQL interactive terminal.  Similarly, improper neutralization of quoting syntax in PostgreSQL command line utility programs allows a source of command line arguments to achieve SQL injection when client_encoding is BIG5 and server_encoding is one of EUC_TW or MULE_INTERNAL.  Versions before PostgreSQL 17.3, 16.7, 15.11, 14.16, and 13.19 are affected.\n\ud83d\udccf Published: 2025-02-13T15:31:25Z\n\ud83d\udccf Modified: 2025-02-16T21:31:43Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-1094\n2. https://lists.debian.org/debian-lts-announce/2025/02/msg00015.html\n3. https://www.postgresql.org/support/security/CVE-2025-1094\n4. http://www.openwall.com/lists/oss-security/2025/02/16/3", "creation_timestamp": "2025-02-17T00:28:20.000000Z"}, {"uuid": "403c0371-ed8a-44a8-aa3c-a8e7f38fd863", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4668", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1094\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Improper neutralization of quoting syntax in PostgreSQL libpq functions PQescapeLiteral(), PQescapeIdentifier(), PQescapeString(), and PQescapeStringConn() allows a database input provider to achieve SQL injection in certain usage patterns.  Specifically, SQL injection requires the application to use the function result to construct input to psql, the PostgreSQL interactive terminal.  Similarly, improper neutralization of quoting syntax in PostgreSQL command line utility programs allows a source of command line arguments to achieve SQL injection when client_encoding is BIG5 and server_encoding is one of EUC_TW or MULE_INTERNAL.  Versions before PostgreSQL 17.3, 16.7, 15.11, 14.16, and 13.19 are affected.\n\ud83d\udccf Published: 2025-02-13T15:31:25Z\n\ud83d\udccf Modified: 2025-02-16T21:31:43Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-1094\n2. https://lists.debian.org/debian-lts-announce/2025/02/msg00015.html\n3. https://www.postgresql.org/support/security/CVE-2025-1094\n4. http://www.openwall.com/lists/oss-security/2025/02/16/3", "creation_timestamp": "2025-02-17T00:29:25.000000Z"}, {"uuid": "66a83f6b-c796-4bbf-96a6-f79c7a87aed8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4673", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1094\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Improper neutralization of quoting syntax in PostgreSQL libpq functions PQescapeLiteral(), PQescapeIdentifier(), PQescapeString(), and PQescapeStringConn() allows a database input provider to achieve SQL injection in certain usage patterns.  Specifically, SQL injection requires the application to use the function result to construct input to psql, the PostgreSQL interactive terminal.  Similarly, improper neutralization of quoting syntax in PostgreSQL command line utility programs allows a source of command line arguments to achieve SQL injection when client_encoding is BIG5 and server_encoding is one of EUC_TW or MULE_INTERNAL.  Versions before PostgreSQL 17.3, 16.7, 15.11, 14.16, and 13.19 are affected.\n\ud83d\udccf Published: 2025-02-13T15:31:25Z\n\ud83d\udccf Modified: 2025-02-16T21:31:43Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-1094\n2. https://lists.debian.org/debian-lts-announce/2025/02/msg00015.html\n3. https://www.postgresql.org/support/security/CVE-2025-1094\n4. http://www.openwall.com/lists/oss-security/2025/02/16/3", "creation_timestamp": "2025-02-17T00:30:31.000000Z"}, {"uuid": "ebc8180f-a09e-4a92-adad-29ea6141d0ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4683", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1094\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Improper neutralization of quoting syntax in PostgreSQL libpq functions PQescapeLiteral(), PQescapeIdentifier(), PQescapeString(), and PQescapeStringConn() allows a database input provider to achieve SQL injection in certain usage patterns.  Specifically, SQL injection requires the application to use the function result to construct input to psql, the PostgreSQL interactive terminal.  Similarly, improper neutralization of quoting syntax in PostgreSQL command line utility programs allows a source of command line arguments to achieve SQL injection when client_encoding is BIG5 and server_encoding is one of EUC_TW or MULE_INTERNAL.  Versions before PostgreSQL 17.3, 16.7, 15.11, 14.16, and 13.19 are affected.\n\ud83d\udccf Published: 2025-02-13T15:31:25Z\n\ud83d\udccf Modified: 2025-02-16T21:31:43Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-1094\n2. https://lists.debian.org/debian-lts-announce/2025/02/msg00015.html\n3. https://www.postgresql.org/support/security/CVE-2025-1094\n4. http://www.openwall.com/lists/oss-security/2025/02/16/3", "creation_timestamp": "2025-02-17T00:32:35.000000Z"}, {"uuid": "b2c8120c-1b08-48e8-9bb9-9d63a704d57c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4698", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1094\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Improper neutralization of quoting syntax in PostgreSQL libpq functions PQescapeLiteral(), PQescapeIdentifier(), PQescapeString(), and PQescapeStringConn() allows a database input provider to achieve SQL injection in certain usage patterns.  Specifically, SQL injection requires the application to use the function result to construct input to psql, the PostgreSQL interactive terminal.  Similarly, improper neutralization of quoting syntax in PostgreSQL command line utility programs allows a source of command line arguments to achieve SQL injection when client_encoding is BIG5 and server_encoding is one of EUC_TW or MULE_INTERNAL.  Versions before PostgreSQL 17.3, 16.7, 15.11, 14.16, and 13.19 are affected.\n\ud83d\udccf Published: 2025-02-13T15:31:25Z\n\ud83d\udccf Modified: 2025-02-16T21:31:43Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-1094\n2. https://lists.debian.org/debian-lts-announce/2025/02/msg00015.html\n3. https://www.postgresql.org/support/security/CVE-2025-1094\n4. http://www.openwall.com/lists/oss-security/2025/02/16/3", "creation_timestamp": "2025-02-17T00:35:51.000000Z"}, {"uuid": "a4481807-62e6-4cb4-8344-dcdbebab1c60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4693", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1094\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Improper neutralization of quoting syntax in PostgreSQL libpq functions PQescapeLiteral(), PQescapeIdentifier(), PQescapeString(), and PQescapeStringConn() allows a database input provider to achieve SQL injection in certain usage patterns.  Specifically, SQL injection requires the application to use the function result to construct input to psql, the PostgreSQL interactive terminal.  Similarly, improper neutralization of quoting syntax in PostgreSQL command line utility programs allows a source of command line arguments to achieve SQL injection when client_encoding is BIG5 and server_encoding is one of EUC_TW or MULE_INTERNAL.  Versions before PostgreSQL 17.3, 16.7, 15.11, 14.16, and 13.19 are affected.\n\ud83d\udccf Published: 2025-02-13T15:31:25Z\n\ud83d\udccf Modified: 2025-02-16T21:31:43Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-1094\n2. https://lists.debian.org/debian-lts-announce/2025/02/msg00015.html\n3. https://www.postgresql.org/support/security/CVE-2025-1094\n4. http://www.openwall.com/lists/oss-security/2025/02/16/3", "creation_timestamp": "2025-02-17T00:34:46.000000Z"}, {"uuid": "dc2f51a6-8326-46c8-a2a1-0ffa3267c5f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4622", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: GHSA-mhw9-x46c-v6q4\n\ud83d\udd25 CVSS Score: 8.1 (CVSS_V3)\n\ud83d\udd39 Description: Improper neutralization of quoting syntax in PostgreSQL libpq functions PQescapeLiteral(), PQescapeIdentifier(), PQescapeString(), and PQescapeStringConn() allows a database input provider to achieve SQL injection in certain usage patterns.  Specifically, SQL injection requires the application to use the function result to construct input to psql, the PostgreSQL interactive terminal.  Similarly, improper neutralization of quoting syntax in PostgreSQL command line utility programs allows a source of command line arguments to achieve SQL injection when client_encoding is BIG5 and server_encoding is one of EUC_TW or MULE_INTERNAL.  Versions before PostgreSQL 17.3, 16.7, 15.11, 14.16, and 13.19 are affected.\n\ud83d\udccf Published: 2025-02-13T15:31:25Z\n\ud83d\udccf Modified: 2025-02-16T21:31:43Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-1094\n2. https://lists.debian.org/debian-lts-announce/2025/02/msg00015.html\n3. https://www.postgresql.org/support/security/CVE-2025-1094\n4. http://www.openwall.com/lists/oss-security/2025/02/16/3", "creation_timestamp": "2025-02-17T00:21:08.000000Z"}, {"uuid": "c5c28342-c900-45c7-98f1-786a52d4ab84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4627", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: GHSA-mhw9-x46c-v6q4\n\ud83d\udd25 CVSS Score: 8.1 (CVSS_V3)\n\ud83d\udd39 Description: Improper neutralization of quoting syntax in PostgreSQL libpq functions PQescapeLiteral(), PQescapeIdentifier(), PQescapeString(), and PQescapeStringConn() allows a database input provider to achieve SQL injection in certain usage patterns.  Specifically, SQL injection requires the application to use the function result to construct input to psql, the PostgreSQL interactive terminal.  Similarly, improper neutralization of quoting syntax in PostgreSQL command line utility programs allows a source of command line arguments to achieve SQL injection when client_encoding is BIG5 and server_encoding is one of EUC_TW or MULE_INTERNAL.  Versions before PostgreSQL 17.3, 16.7, 15.11, 14.16, and 13.19 are affected.\n\ud83d\udccf Published: 2025-02-13T15:31:25Z\n\ud83d\udccf Modified: 2025-02-16T21:31:43Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-1094\n2. https://lists.debian.org/debian-lts-announce/2025/02/msg00015.html\n3. https://www.postgresql.org/support/security/CVE-2025-1094\n4. http://www.openwall.com/lists/oss-security/2025/02/16/3", "creation_timestamp": "2025-02-17T00:22:14.000000Z"}, {"uuid": "68d5dee4-a295-476c-8518-6712b8229743", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4658", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1094\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Improper neutralization of quoting syntax in PostgreSQL libpq functions PQescapeLiteral(), PQescapeIdentifier(), PQescapeString(), and PQescapeStringConn() allows a database input provider to achieve SQL injection in certain usage patterns.  Specifically, SQL injection requires the application to use the function result to construct input to psql, the PostgreSQL interactive terminal.  Similarly, improper neutralization of quoting syntax in PostgreSQL command line utility programs allows a source of command line arguments to achieve SQL injection when client_encoding is BIG5 and server_encoding is one of EUC_TW or MULE_INTERNAL.  Versions before PostgreSQL 17.3, 16.7, 15.11, 14.16, and 13.19 are affected.\n\ud83d\udccf Published: 2025-02-13T15:31:25Z\n\ud83d\udccf Modified: 2025-02-16T21:31:43Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-1094\n2. https://lists.debian.org/debian-lts-announce/2025/02/msg00015.html\n3. https://www.postgresql.org/support/security/CVE-2025-1094\n4. http://www.openwall.com/lists/oss-security/2025/02/16/3", "creation_timestamp": "2025-02-17T00:27:27.000000Z"}, {"uuid": "190261cf-b8fa-4e16-834a-1d0291b1ccb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4678", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1094\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Improper neutralization of quoting syntax in PostgreSQL libpq functions PQescapeLiteral(), PQescapeIdentifier(), PQescapeString(), and PQescapeStringConn() allows a database input provider to achieve SQL injection in certain usage patterns.  Specifically, SQL injection requires the application to use the function result to construct input to psql, the PostgreSQL interactive terminal.  Similarly, improper neutralization of quoting syntax in PostgreSQL command line utility programs allows a source of command line arguments to achieve SQL injection when client_encoding is BIG5 and server_encoding is one of EUC_TW or MULE_INTERNAL.  Versions before PostgreSQL 17.3, 16.7, 15.11, 14.16, and 13.19 are affected.\n\ud83d\udccf Published: 2025-02-13T15:31:25Z\n\ud83d\udccf Modified: 2025-02-16T21:31:43Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-1094\n2. https://lists.debian.org/debian-lts-announce/2025/02/msg00015.html\n3. https://www.postgresql.org/support/security/CVE-2025-1094\n4. http://www.openwall.com/lists/oss-security/2025/02/16/3", "creation_timestamp": "2025-02-17T00:31:36.000000Z"}, {"uuid": "d3cffa20-0734-40b0-87ae-52f335f348eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4632", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1094\n\ud83d\udd25 CVSS Score: 8.1 (CVSS_V3)\n\ud83d\udd39 Description: Improper neutralization of quoting syntax in PostgreSQL libpq functions PQescapeLiteral(), PQescapeIdentifier(), PQescapeString(), and PQescapeStringConn() allows a database input provider to achieve SQL injection in certain usage patterns.  Specifically, SQL injection requires the application to use the function result to construct input to psql, the PostgreSQL interactive terminal.  Similarly, improper neutralization of quoting syntax in PostgreSQL command line utility programs allows a source of command line arguments to achieve SQL injection when client_encoding is BIG5 and server_encoding is one of EUC_TW or MULE_INTERNAL.  Versions before PostgreSQL 17.3, 16.7, 15.11, 14.16, and 13.19 are affected.\n\ud83d\udccf Published: 2025-02-13T15:31:25Z\n\ud83d\udccf Modified: 2025-02-16T21:31:43Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-1094\n2. https://lists.debian.org/debian-lts-announce/2025/02/msg00015.html\n3. https://www.postgresql.org/support/security/CVE-2025-1094\n4. http://www.openwall.com/lists/oss-security/2025/02/16/3", "creation_timestamp": "2025-02-17T00:22:55.000000Z"}, {"uuid": "e538e162-08b4-492b-9cec-21cf538364dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4637", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1094\n\ud83d\udd25 CVSS Score: 8.1 (CVSS_V3)\n\ud83d\udd39 Description: Improper neutralization of quoting syntax in PostgreSQL libpq functions PQescapeLiteral(), PQescapeIdentifier(), PQescapeString(), and PQescapeStringConn() allows a database input provider to achieve SQL injection in certain usage patterns.  Specifically, SQL injection requires the application to use the function result to construct input to psql, the PostgreSQL interactive terminal.  Similarly, improper neutralization of quoting syntax in PostgreSQL command line utility programs allows a source of command line arguments to achieve SQL injection when client_encoding is BIG5 and server_encoding is one of EUC_TW or MULE_INTERNAL.  Versions before PostgreSQL 17.3, 16.7, 15.11, 14.16, and 13.19 are affected.\n\ud83d\udccf Published: 2025-02-13T15:31:25Z\n\ud83d\udccf Modified: 2025-02-16T21:31:43Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-1094\n2. https://lists.debian.org/debian-lts-announce/2025/02/msg00015.html\n3. https://www.postgresql.org/support/security/CVE-2025-1094\n4. http://www.openwall.com/lists/oss-security/2025/02/16/3", "creation_timestamp": "2025-02-17T00:24:00.000000Z"}, {"uuid": "56c2b395-6472-4e1f-afd6-60070059f3ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://t.me/cvedetector/17993", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1094 - PostgreSQL SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-1094 \nPublished : Feb. 13, 2025, 1:15 p.m. | 19\u00a0minutes ago \nDescription : Improper neutralization of quoting syntax in PostgreSQL libpq functions PQescapeLiteral(), PQescapeIdentifier(), PQescapeString(), and PQescapeStringConn() allows a database input provider to achieve SQL injection in certain usage patterns.  Specifically, SQL injection requires the application to use the function result to construct input to psql, the PostgreSQL interactive terminal.  Similarly, improper neutralization of quoting syntax in PostgreSQL command line utility programs allows a source of command line arguments to achieve SQL injection when client_encoding is BIG5 and server_encoding is one of EUC_TW or MULE_INTERNAL.  Versions before PostgreSQL 17.3, 16.7, 15.11, 14.16, and 13.19 are affected. \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-13T14:39:07.000000Z"}, {"uuid": "d3cf399b-6965-4059-94bb-4f3677910c1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/41617", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-1094\nURL\uff1ahttps://github.com/B1ack4sh/Blackash-CVE-2025-1094\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-06-23T18:19:57.000000Z"}, {"uuid": "26f2a99a-97ae-41f5-8e6c-140a51979eaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "published-proof-of-concept", "source": "https://t.me/badbclubua/185", "content": "PostgreSQL 14.15 \u0440\u0430\u0431\u043e\u0447\u0438\u0439 RCE\n\n\u0422\u0443\u0442: https://hackyboiz.github.io/2025/04/30/clalxk/CVE-2025-1094/", "creation_timestamp": "2025-05-08T06:12:53.000000Z"}, {"uuid": "4f90b779-66c1-4c03-a90b-d28fb9a4535a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-10948", "type": "published-proof-of-concept", "source": "Telegram/NFUOz4b2EoG8xP_1G0p6JsW-XiOhhvP4Wfgot8xuJEzt_O-d", "content": "", "creation_timestamp": "2025-09-26T00:23:14.000000Z"}, {"uuid": "2f8cf2d8-e0ef-444d-96b9-26bcf5473475", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-10948", "type": "seen", "source": "Telegram/Y7dnVDBwpVcPpOnUs2UfFG1s1N6BTpuiCJRnyJBQvHL1LfGI", "content": "", "creation_timestamp": "2025-09-25T17:03:27.000000Z"}, {"uuid": "100614c2-2021-4f7e-b58b-8fdb319de024", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "exploited", "source": "https://t.me/ton618cyber/6658", "content": "PostgreSQL Vulnerability Exploited Alongside BeyondTrust Zero-Day in Targeted Attacks\n\nPostgreSQL SQL injection flaw (CVE-2025-1094) exploited alongside BeyondTrust zero-day, enabling arbitrary code execution.\n\nThe Hacker News | thehackernews.com \u2022 Feb 14, 2025", "creation_timestamp": "2025-02-15T15:03:21.000000Z"}, {"uuid": "34f72906-455a-4b90-bca3-596bdf181120", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "published-proof-of-concept", "source": "https://t.me/ap_security/796", "content": "#pentest\n\nPoC CVE-2025-1094 \n\n\u0412 \u0421\u0423\u0411\u0414 PostgreSQL \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044f SQL-\u043a\u043e\u0434\u0430, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u043e\u0439 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u043e\u0439 \u0438\u043d\u0442\u0435\u0440\u0430\u043a\u0442\u0438\u0432\u043d\u044b\u043c \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u043e\u043c PostgreSQL psql \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u043d\u044b\u0445 \u043d\u0435\u0434\u043e\u043f\u0443\u0441\u0442\u0438\u043c\u044b\u0445 \u0431\u0430\u0439\u0442\u043e\u0432\u044b\u0445 \u043f\u043e\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u0435\u0439 \u0432 \u0441\u0438\u043c\u0432\u043e\u043b\u0430\u0445 UTF-8. \u0417\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b \u0432\u0441\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 PostgreSQL \u0434\u043e 17.3, 16.7, 15.11, 14.16 \u0438 13.19.\n\n\u041f\u043e\u0437\u043d\u0430\u043a\u043e\u043c\u0438\u0442\u044c\u0441\u044f \u0441 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u043c \u043c\u043e\u0436\u043d\u043e \u043f\u043e \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0435\u0439 \u0441\u0441\u044b\u043b\u043a\u0435.", "creation_timestamp": "2025-03-05T06:01:47.000000Z"}, {"uuid": "10217a2d-a73d-4c20-8084-57ab62fa52eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "published-proof-of-concept", "source": "Telegram/X5o6JxwVyT7kcEs2WJ4q2ZFDLNC-MBNLMsHZTgnAYZthkfU", "content": "", "creation_timestamp": "2025-06-24T03:00:07.000000Z"}, {"uuid": "d40b2bbe-8e3d-4d93-a9ca-e087360cbb86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "published-proof-of-concept", "source": "Telegram/rLwJW8Sxt7uWsdYlvaJmmjpBkh3NAlLwTD4aRP5kjpBY5_E", "content": "", "creation_timestamp": "2025-06-23T21:00:07.000000Z"}, {"uuid": "9e289b79-8fa0-402e-b7b0-f39ff5f9b46c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/6989", "content": "#exploit\n1. CVE-2024-48248:\nNAKIVO Backup Replication Vulnerability\nhttps://labs.watchtowr.com/the-best-security-is-when-we-all-agree-to-keep-everything-secret-except-the-secrets-nakivo-backup-replication-cve-2024-48248\n\n2. CVE-2025-24016:\nWazuh Unsafe Deserialization RCE\nhttps://github.com/0xjessie21/CVE-2025-24016\n\n3. CVE-2025-1094:\nSQLI to RCE via WebSocket\nhttps://github.com/soltanali0/CVE-2025-1094-Exploit", "creation_timestamp": "2025-02-28T07:48:31.000000Z"}, {"uuid": "0e78310a-2fd7-4376-91e0-e6541ff56511", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "Telegram/SVynSwajLsN1aWxvMEuqgdPOPDTFCIEIjBJU5TY6OBLU3A", "content": "", "creation_timestamp": "2025-02-16T13:31:31.000000Z"}, {"uuid": "b0e74ed2-53a0-4da1-baae-139eb3143ec3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "Telegram/k6bcnCEXoiRTeYGHcw8hjlg-4Zx2_3PkVyh15sl6rUt95RGh", "content": "", "creation_timestamp": "2025-02-17T03:38:39.000000Z"}, {"uuid": "c414cd6d-2d7c-462c-900a-80a687b1c037", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/2594", "content": "#exploit\n1. CVE-2024-48248:\nNAKIVO Backup Replication Vulnerability\nhttps://labs.watchtowr.com/the-best-security-is-when-we-all-agree-to-keep-everything-secret-except-the-secrets-nakivo-backup-replication-cve-2024-48248\n\n2. CVE-2025-24016:\nWazuh Unsafe Deserialization RCE\nhttps://github.com/0xjessie21/CVE-2025-24016\n\n3. CVE-2025-1094:\nSQLI to RCE via WebSocket\nhttps://github.com/soltanali0/CVE-2025-1094-Exploit", "creation_timestamp": "2025-02-28T07:48:31.000000Z"}, {"uuid": "026fff26-b89b-41f2-ae0b-3327e3b92d6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "Telegram/86MsLzx41BBQCm5F0OQQqhcKpmmu1Yc3pOXT98CmIu-mJFlq", "content": "", "creation_timestamp": "2025-02-16T22:52:56.000000Z"}, {"uuid": "d04e2b72-77e5-4c35-95d7-cfe9e8828f6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "exploited", "source": "https://t.me/ton618cyber/2440", "content": "PostgreSQL Vulnerability Exploited Alongside BeyondTrust Zero-Day in Targeted Attacks\n\nPostgreSQL SQL injection flaw (CVE-2025-1094) exploited alongside BeyondTrust zero-day, enabling arbitrary code execution.\n\nThe Hacker News | thehackernews.com \u2022 Feb 14, 2025", "creation_timestamp": "2025-02-15T15:03:22.000000Z"}, {"uuid": "8a406547-961c-471d-8acc-84a172fe516d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "published-proof-of-concept", "source": "Telegram/LWEMIn-EzE3NNYeFV9ynjXUTE464O_c4ozFXiGTc7TBakA", "content": "", "creation_timestamp": "2025-02-14T09:13:47.000000Z"}, {"uuid": "219d5543-79a2-425f-a96b-1e66f5d68cbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "Telegram/s8Mc-oqFNaL4hRdq6RMn5lDFKUymcIMN_VlaNxPdNO2jbGdi", "content": "", "creation_timestamp": "2025-02-14T10:08:09.000000Z"}, {"uuid": "ae9a828b-0087-451c-8cc7-8dbcfbc390dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "Telegram/6rKxao6LUchP7UFpRIkKj7aLQhRJBSTQyT-qNWDDagCVqZOK", "content": "", "creation_timestamp": "2025-02-14T10:09:23.000000Z"}, {"uuid": "ed450fca-e5af-4f11-98a2-6cd38cb8a1cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://t.me/ViralCyber/10943", "content": "\ud83d\udd34 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc SQLi \u062f\u0631 PostgreSQL\n\n\u062f\u0631 \u0627\u06cc\u0646 \u067e\u0633\u062a \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc CVE-2025-1094 \u062f\u0631 PostgreSQL \u0648 \u0627\u0631\u062a\u0628\u0627\u0637 \u0627\u0648\u0646 \u0628\u0627 \u0647\u06a9 BeyondTrust \u0648 \u0686\u0646\u062f\u06cc\u0646 \u0633\u0627\u0632\u0645\u0627\u0646 \u0648 \u0622\u0698\u0627\u0646\u0633 \u0622\u0645\u0631\u06cc\u06a9\u0627\u06cc\u06cc \u0631\u0648 \u0628\u0631\u0631\u0633\u06cc \u06a9\u0631\u062f\u06cc\u0645.\n\n#\u0622\u0633\u06cc\u0628_\u067e\u0630\u06cc\u0631\u06cc_\u0627\u0645\u0646\u06cc\u062a\u06cc #\u0628\u0627\u0632\u06cc\u06af\u0631\u0627\u0646_\u062a\u0647\u062f\u06cc\u062f \n#PostgreSQL #CVE #APT #SaltTyphoon #sqlinjection #BeyondTrust\n\n\ud83c\udd94 @onhex_ir\n\u27a1\ufe0f ALL Link", "creation_timestamp": "2025-02-16T10:13:30.000000Z"}, {"uuid": "10235a4e-9189-4382-9f33-15da0c1209e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "Telegram/0dq4CyDoxIkmDjWnAV9ZBlR_O1GjsP_2A0uiMyT6A87lNUsF", "content": "", "creation_timestamp": "2025-02-20T23:26:56.000000Z"}, {"uuid": "cfdffd08-00ce-4594-8477-8ebf093ea90d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "Telegram/7cGkrQR78WdWoI68IFXq-a1o0Ckv5vq9BF_af26U4jMYFnfQ", "content": "", "creation_timestamp": "2025-02-14T10:06:09.000000Z"}, {"uuid": "1a62303c-be30-4f04-990d-f6ad8e82082b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "published-proof-of-concept", "source": "Telegram/xjXKnTC2aFGOJp1Zv873fuHgk-UREcKYoiX2QZ2a4Rbmv2s", "content": "", "creation_timestamp": "2025-03-05T10:00:06.000000Z"}, {"uuid": "aa2290e2-b72c-4be7-b1cd-0cba2fd44476", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "published-proof-of-concept", "source": "Telegram/nuyg1sy73c7XUPU13j0x9e6k7n02OK9OtgMKrFr6tN1HIhk", "content": "", "creation_timestamp": "2025-03-05T08:00:10.000000Z"}, {"uuid": "b183b592-6334-4b07-8b35-e8d6e79ff0a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "published-proof-of-concept", "source": "Telegram/2eBctvejsz4Cq0CvvHsAn8MVWplT5DtGo-xvSOxtHROW0yg", "content": "", "creation_timestamp": "2025-03-15T12:00:08.000000Z"}, {"uuid": "c77830ba-996f-49a8-816b-2cf874ba47f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "published-proof-of-concept", "source": "Telegram/x-xQYLiT6c2KwAclOItHPJ6mMLNM1F62QdJruxX3gagbh9k", "content": "", "creation_timestamp": "2025-03-01T00:00:11.000000Z"}, {"uuid": "157396e9-e82b-427d-9557-f52d1c951055", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "seen", "source": "https://t.me/thehackernews/6343", "content": "\ud83d\uded1 A dangerous combo attack has been discovered exploiting a PostgreSQL SQL injection flaw (CVE-2025-1094) and a BeyondTrust remote access bug (CVE-2024-12356).\n\n\ud83d\udee0\ufe0f Patches available for both vulnerabilities.\n\n\ud83d\udd17 Read more and secure your systems NOW: https://thehackernews.com/2025/02/postgresql-vulnerability-exploited.html", "creation_timestamp": "2025-02-14T06:41:28.000000Z"}, {"uuid": "6c239b49-ade4-4841-b512-f04a1a0498ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "published-proof-of-concept", "source": "https://t.me/zero_day_uz/480", "content": "CVE-2025-1094\n*\nRCE SQL Injection in PostgreSQL 14.15\n*\nexploit", "creation_timestamp": "2025-05-01T13:24:06.000000Z"}, {"uuid": "0011fca5-36bb-46b3-a060-389c6955dc6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2608", "content": "CVE-2025-1094\n*\nRCE SQL Injection in PostgreSQL 14.15\n*\nexploit", "creation_timestamp": "2025-05-01T00:46:13.000000Z"}, {"uuid": "2904479b-8d41-457a-aafd-e935e74fa349", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11868", "content": "#exploit\n1. CVE-2024-48248:\nNAKIVO Backup Replication Vulnerability\nhttps://labs.watchtowr.com/the-best-security-is-when-we-all-agree-to-keep-everything-secret-except-the-secrets-nakivo-backup-replication-cve-2024-48248\n\n2. CVE-2025-24016:\nWazuh Unsafe Deserialization RCE\nhttps://github.com/0xjessie21/CVE-2025-24016\n\n3. CVE-2025-1094:\nSQLI to RCE via WebSocket\nhttps://github.com/soltanali0/CVE-2025-1094-Exploit", "creation_timestamp": "2025-02-27T22:17:19.000000Z"}, {"uuid": "dd7af073-c9a8-4db0-8153-9ba85ee126a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/9716", "content": "CVE-2025-1094: PostgreSQL SQL Injection Vulnerability - ARMO\n\nhttps://www.armosec.io/blog/cve-2025-1094-postgresql-sql-injection-vulnerability/", "creation_timestamp": "2025-03-11T08:56:28.000000Z"}, {"uuid": "510864a8-b910-49ea-8878-80fb7068d824", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1094", "type": "published-proof-of-concept", "source": "https://t.me/suboxone_chatroom/7443", "content": "\ud83d\udea8 CVE-2025-1094: PostgreSQL psql SQL injection\n\ud83d\udd25PoC:https://github.com/rapid7/metasploit-framework/pull/19877\n\ud83e\uddd0Deep Dive :https://attackerkb.com/topics/G5s8ZWAbYH/cve-2024-12356/rapid7-analysis\n\n\ud83d\udc47Dorks:\nHUNTER : protocol=\"postgresql\"\nFOFA : product=\"PostgreSQL\"\nSHODAN : \"port:5432 PostgreSQL\"\n\n\ud83d\udcf0Refer:https://thecyberthrone.in/2025/02/15/cve-2025-1094-impacts-postgresql-with-sql-injection/\n\n\nhttps://t.me/SuBoXoneSoCiety", "creation_timestamp": "2025-04-01T12:42:19.000000Z"}]}