Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | 飞致云 DataEase Postgresql JDBC Bypass 远程代码执行漏洞 CVE-2025-49002 漏洞类型 RCE | https://github.com/Feng-Huang-0520/DataEase_Postgresql_JDBC_Bypass-CVE-2025-49002 | POC Details |
| 2 | None | https://github.com/jiuzui129-arch/CVE-2025-49002 | POC Details |
| 3 | DataEase is an open-source business intelligence and data visualization platform. Public advisories state that CVE-2025-49002 is related to a bypass in the previous fix for CVE-2025-32966 involving case-insensitive handling of restricted H2 JDBC keywords. This template is a non-invasive detection template intended only to identify exposed DataEase instances and extract possible version hints for manual verification. It does not attempt authentication bypass, JDBC exploitation, or command execution. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-49002.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2025-48998 | Dataease MYSQL JDBC File Reading Vulnerability | |
| CVE-2025-48999 | Dataease Redshift Data Source JDBC Connection Parameters Not Verified Leads to RCE Vulnera | |
| CVE-2025-49001 | Dataease Authentication Bypass Vulnerability |
No comments yet