Pgbouncer

Pgbouncer

10 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 09.05.2026 01:16:09
  • Zuletzt bearbeitet 14.05.2026 18:52:26

The SCRAM code in PgBouncer before 1.25.2 did not check the return value of strlcat() correctly when building the contents of the SCRAM client-final-message. A malicious backend that sends a SCRAM server-final-message with a long nonce can trigger a ...

  • EPSS 0.02%
  • Veröffentlicht 09.05.2026 01:16:09
  • Zuletzt bearbeitet 14.05.2026 18:49:25

A possible null pointer reference in PgBouncer before 1.25.2 could lead to a crash, if a server sends an error response without SQLSTATE field.

  • EPSS 0.01%
  • Veröffentlicht 09.05.2026 01:16:09
  • Zuletzt bearbeitet 14.05.2026 18:49:06

PgBouncer before 1.25.2 did not perform an appropriate authorization check for the KILL_CLIENT admin command. All users with access to the administration console (which itself requires authorization) could run this command. It would have been correct...

  • EPSS 0.05%
  • Veröffentlicht 09.05.2026 01:16:08
  • Zuletzt bearbeitet 14.05.2026 18:52:42

An integer overflow in network packet parsing code in PgBouncer before 1.25.2 bypasses a boundary check and can lead to a crash. An unauthenticated remote attacker can crash PgBouncer with a malformed SCRAM authentication packet.

  • EPSS 0.19%
  • Veröffentlicht 03.12.2025 19:15:55
  • Zuletzt bearbeitet 27.12.2025 16:15:51

Untrusted search path in auth_query connection handler in PgBouncer before 1.25.1 allows an unauthenticated attacker to execute arbitrary SQL during authentication via a malicious search_path parameter in the StartupMessage.

  • EPSS 0.3%
  • Veröffentlicht 16.04.2025 18:16:04
  • Zuletzt bearbeitet 08.12.2025 18:32:49

Password can be used past expiry in PgBouncer due to auth_query not taking into account Postgres its VALID UNTIL value, which allows an attacker to log in with an already expired password

Exploit
  • EPSS 0.06%
  • Veröffentlicht 23.11.2021 19:15:07
  • Zuletzt bearbeitet 21.11.2024 06:22:07

A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulner...

  • EPSS 0.08%
  • Veröffentlicht 22.11.2021 16:15:07
  • Zuletzt bearbeitet 03.11.2025 20:15:50

When PgBouncer is configured to use "cert" authentication, a man-in-the-middle attacker can inject arbitrary SQL queries when a connection is first established, despite the use of TLS certificate verification and encryption. This flaw affects PgBounc...

  • EPSS 1.37%
  • Veröffentlicht 23.05.2017 04:29:01
  • Zuletzt bearbeitet 13.05.2026 00:24:29

PgBouncer 1.6.x before 1.6.1, when configured with auth_user, allows remote attackers to gain login access as auth_user via an unknown username.

Exploit
  • EPSS 3.38%
  • Veröffentlicht 23.05.2017 04:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

PgBouncer before 1.5.5 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by sending a password packet before a startup packet.