-
https://www.phrozen.io/resources/paper/41df297b-cfe3-43ec-88e8-0686e5548dd5
How a Postgres Extension Shellcode Execution Exploit Works — This would take a little work to pull off, as it requires a user be able to execute queries as a privileged user and also to place a specially crafted DLL on the server, but it’s useful to be aware of vectors like this.