Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-6667 (GCVE-0-2026-6667)
Vulnerability from cvelistv5 – Published: 2026-05-09 00:43 – Updated: 2026-05-11 14:44- CWE-862 - Missing Authorization
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-6667",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-05-11T14:44:31.243812Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-05-11T14:44:43.075Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "PgBouncer",
"vendor": "n/a",
"versions": [
{
"lessThan": "1.25.2",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Thanks to HarutoKimura for finding and reporting this problem."
}
],
"descriptions": [
{
"lang": "en",
"value": "PgBouncer before 1.25.2 did not perform an appropriate authorization check for the KILL_CLIENT admin command. All users with access to the administration console (which itself requires authorization) could run this command. It would have been correct to allow only users listed in the admin_users parameter."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-862",
"description": "Missing Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-05-09T00:43:53.126Z",
"orgId": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"shortName": "PostgreSQL"
},
"references": [
{
"url": "https://www.pgbouncer.org/changelog.html#pgbouncer-125x"
}
],
"title": "PgBouncer missing authorization check in KILL_CLIENT admin command"
}
},
"cveMetadata": {
"assignerOrgId": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"assignerShortName": "PostgreSQL",
"cveId": "CVE-2026-6667",
"datePublished": "2026-05-09T00:43:53.126Z",
"dateReserved": "2026-04-20T12:25:45.561Z",
"dateUpdated": "2026-05-11T14:44:43.075Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-6667",
"date": "2026-05-14",
"epss": "0.00012",
"percentile": "0.01685"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-6667\",\"sourceIdentifier\":\"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007\",\"published\":\"2026-05-09T01:16:09.287\",\"lastModified\":\"2026-05-14T18:49:06.290\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"PgBouncer before 1.25.2 did not perform an appropriate authorization check for the KILL_CLIENT admin command. All users with access to the administration console (which itself requires authorization) could run this command. It would have been correct to allow only users listed in the admin_users parameter.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":4.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.8,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-862\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pgbouncer:pgbouncer:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.25.2\",\"matchCriteriaId\":\"FC45BB66-2289-466A-BC28-113710202BA5\"}]}]}],\"references\":[{\"url\":\"https://www.pgbouncer.org/changelog.html#pgbouncer-125x\",\"source\":\"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007\",\"tags\":[\"Release Notes\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-6667\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-05-11T14:44:31.243812Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-05-11T14:44:39.195Z\"}}], \"cna\": {\"title\": \"PgBouncer missing authorization check in KILL_CLIENT admin command\", \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Thanks to HarutoKimura for finding and reporting this problem.\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 4.3, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L\"}}], \"affected\": [{\"vendor\": \"n/a\", \"product\": \"PgBouncer\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"1.25.2\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://www.pgbouncer.org/changelog.html#pgbouncer-125x\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"PgBouncer before 1.25.2 did not perform an appropriate authorization check for the KILL_CLIENT admin command. All users with access to the administration console (which itself requires authorization) could run this command. It would have been correct to allow only users listed in the admin_users parameter.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-862\", \"description\": \"Missing Authorization\"}]}], \"providerMetadata\": {\"orgId\": \"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007\", \"shortName\": \"PostgreSQL\", \"dateUpdated\": \"2026-05-09T00:43:53.126Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-6667\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-05-11T14:44:43.075Z\", \"dateReserved\": \"2026-04-20T12:25:45.561Z\", \"assignerOrgId\": \"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007\", \"datePublished\": \"2026-05-09T00:43:53.126Z\", \"assignerShortName\": \"PostgreSQL\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
FKIE_CVE-2026-6667
Vulnerability from fkie_nvd - Published: 2026-05-09 01:16 - Updated: 2026-05-14 18:49{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pgbouncer:pgbouncer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FC45BB66-2289-466A-BC28-113710202BA5",
"versionEndExcluding": "1.25.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PgBouncer before 1.25.2 did not perform an appropriate authorization check for the KILL_CLIENT admin command. All users with access to the administration console (which itself requires authorization) could run this command. It would have been correct to allow only users listed in the admin_users parameter."
}
],
"id": "CVE-2026-6667",
"lastModified": "2026-05-14T18:49:06.290",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"type": "Secondary"
}
]
},
"published": "2026-05-09T01:16:09.287",
"references": [
{
"source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"tags": [
"Release Notes"
],
"url": "https://www.pgbouncer.org/changelog.html#pgbouncer-125x"
}
],
"sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-862"
}
],
"source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"type": "Secondary"
}
]
}
CERTFR-2026-AVI-0559
Vulnerability from certfr_avis - Published: 2026-05-12 - Updated: 2026-05-12
De multiples vulnérabilités ont été découvertes dans PostgreSQL PgBouncer. Elles permettent à un attaquant de provoquer un déni de service à distance et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| PostgreSQL | PgBouncer | PgBouncer versions antérieures à 1.25.2 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "PgBouncer versions ant\u00e9rieures \u00e0 1.25.2",
"product": {
"name": "PgBouncer",
"vendor": {
"name": "PostgreSQL",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-6665",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6665"
},
{
"name": "CVE-2026-6667",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6667"
},
{
"name": "CVE-2026-6664",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6664"
},
{
"name": "CVE-2026-6666",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6666"
}
],
"initial_release_date": "2026-05-12T00:00:00",
"last_revision_date": "2026-05-12T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0559",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-05-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans PostgreSQL PgBouncer. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans PostgreSQL PgBouncer ",
"vendor_advisories": [
{
"published_at": "2026-05-11",
"title": "Bulletin de s\u00e9curit\u00e9 PostgreSQL pgbouncer-1252-released-3292",
"url": "https://www.postgresql.org/about/news/pgbouncer-1252-released-3292/"
}
]
}
CERTFR-2026-AVI-0588
Vulnerability from certfr_avis - Published: 2026-05-13 - Updated: 2026-05-13
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | Microsoft SQL Server 2017 pour systèmes x64 (GDR) versions antérieures à 14.0.2110.2 | ||
| Microsoft | N/A | Microsoft Visual Studio 2017 version 15.9 (inclus 15.0 - 15.8) antérieures à 15.9.80 | ||
| Microsoft | N/A | Microsoft SharePoint Enterprise Server 2016 versions antérieures à 16.0.5552.1002 | ||
| Microsoft | N/A | Microsoft Dynamics 365 Business Central Release Wave 2 2025 versions antérieures à 27.6 | ||
| Microsoft | N/A | Microsoft Dynamics 365 Business Central Release Wave 1 2025 versions antérieures à 26.12 | ||
| Microsoft | N/A | Microsoft JIRA SAML SSO plugin versions antérieures à 1.3.3 | ||
| Microsoft | N/A | Microsoft Visual Studio 2026 version 18.5 antérieures à 18.5.3 | ||
| Microsoft | N/A | Microsoft SQL Server 2022 pour systèmes x64 (GDR) versions antérieures à 16.0.1180.1 | ||
| Microsoft | N/A | Microsoft SharePoint Server 2019 versions antérieures à 16.0.10417.20128 | ||
| Microsoft | N/A | M365 Copilot pour Desktop versions antérieures à 19.2604.43111.0 | ||
| Microsoft | N/A | Microsoft SQL Server 2022 pour systèmes x64 (CU 24) versions antérieures à 16.0.4252.3 | ||
| Microsoft | N/A | Microsoft SQL Server 2019 pour systèmes x64 (CU 32) versions antérieures à 15.0.4470.1 | ||
| Microsoft | N/A | Microsoft Data Formulator versions antérieures à 0.7 | ||
| Microsoft | N/A | Microsoft SQL Server 2016 pour systèmes x64 Service Pack 3 (GDR) versions antérieures à 13.0.6490.1 | ||
| Microsoft | N/A | Microsoft Teams pour Android versions antérieures à 1.0.0.2026092103 | ||
| Microsoft | N/A | Microsoft SharePoint Server Subscription Edition versions antérieures à 16.0.19725.20280 | ||
| Microsoft | N/A | Microsoft Dynamics 365 (on-premises) version 9.1 antérieures à 9.1.44.15 | ||
| Microsoft | N/A | Microsoft SQL Server 2025 pour systèmes x64 (CU4) versions antérieures à 17.0.4040.1 | ||
| Microsoft | N/A | Microsoft Visual Studio 2019 version 16.11 (inclus 16.0 - 16.10) antérieures à 16.11.56 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.14 antérieures à 17.14.31 | ||
| Microsoft | N/A | Microsoft SQL Server 2019 pour systèmes x64 (GDR) versions antérieures à 15.0.2170.1 | ||
| Microsoft | N/A | Microsoft SQL Server 2016 pour systèmes x64 Service Pack 3 Azure Connect Feature Pack versions antérieures à 13.0.7085.1 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.12 antérieures à 17.12.20 | ||
| Microsoft | N/A | Microsoft SQL Server 2017 pour systèmes x64 (CU 31) versions antérieures à 14.0.3530.2 | ||
| Microsoft | N/A | Microsoft Confluence SAML SSO plugin versions antérieures à 7.4.0 | ||
| Microsoft | N/A | Visual Studio Code - Live Preview extension versions antérieures à 0.4.19 | ||
| Microsoft | N/A | Microsoft SQL Server 2025 pour systèmes x64 (GDR) versions antérieures à 17.0.1115.1 | ||
| Microsoft | N/A | Microsoft Dynamics 365 Business Central 2026 Release Wave 1 versions antérieures à 28.1 | ||
| Microsoft | N/A | Visual Studio Code versions antérieures à 1.119.1 | ||
| Microsoft | N/A | Microsoft Dynamics 365 Business Central 2024 Release Wave 2 versions antérieures à 25.18 | ||
| Microsoft | N/A | Power Automate pour Desktop versions antérieures à 2.67 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft SQL Server 2017 pour syst\u00e8mes x64 (GDR) versions ant\u00e9rieures \u00e0 14.0.2110.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2017 version 15.9 (inclus 15.0 - 15.8) ant\u00e9rieures \u00e0 15.9.80",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Enterprise Server 2016 versions ant\u00e9rieures \u00e0 16.0.5552.1002",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 Business Central Release Wave 2 2025 versions ant\u00e9rieures \u00e0 27.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 Business Central Release Wave 1 2025 versions ant\u00e9rieures \u00e0 26.12",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft JIRA SAML SSO plugin versions ant\u00e9rieures \u00e0 1.3.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2026 version 18.5 ant\u00e9rieures \u00e0 18.5.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2022 pour syst\u00e8mes x64 (GDR) versions ant\u00e9rieures \u00e0 16.0.1180.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Server 2019 versions ant\u00e9rieures \u00e0 16.0.10417.20128",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "M365 Copilot pour Desktop versions ant\u00e9rieures \u00e0 19.2604.43111.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2022 pour syst\u00e8mes x64 (CU 24) versions ant\u00e9rieures \u00e0 16.0.4252.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2019 pour syst\u00e8mes x64 (CU 32) versions ant\u00e9rieures \u00e0 15.0.4470.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Data Formulator versions ant\u00e9rieures \u00e0 0.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2016 pour syst\u00e8mes x64 Service Pack 3 (GDR) versions ant\u00e9rieures \u00e0 13.0.6490.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Teams pour Android versions ant\u00e9rieures \u00e0 1.0.0.2026092103",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Server Subscription Edition versions ant\u00e9rieures \u00e0 16.0.19725.20280",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 (on-premises) version 9.1 ant\u00e9rieures \u00e0 9.1.44.15",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2025 pour syst\u00e8mes x64 (CU4) versions ant\u00e9rieures \u00e0 17.0.4040.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2019 version 16.11 (inclus 16.0 - 16.10) ant\u00e9rieures \u00e0 16.11.56",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.14 ant\u00e9rieures \u00e0 17.14.31",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2019 pour syst\u00e8mes x64 (GDR) versions ant\u00e9rieures \u00e0 15.0.2170.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2016 pour syst\u00e8mes x64 Service Pack 3 Azure Connect Feature Pack versions ant\u00e9rieures \u00e0 13.0.7085.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.12 ant\u00e9rieures \u00e0 17.12.20",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2017 pour syst\u00e8mes x64 (CU 31) versions ant\u00e9rieures \u00e0 14.0.3530.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Confluence SAML SSO plugin versions ant\u00e9rieures \u00e0 7.4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Visual Studio Code - Live Preview extension versions ant\u00e9rieures \u00e0 0.4.19",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2025 pour syst\u00e8mes x64 (GDR) versions ant\u00e9rieures \u00e0 17.0.1115.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 Business Central 2026 Release Wave 1 versions ant\u00e9rieures \u00e0 28.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Visual Studio Code versions ant\u00e9rieures \u00e0 1.119.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 Business Central 2024 Release Wave 2 versions ant\u00e9rieures \u00e0 25.18",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Power Automate pour Desktop versions ant\u00e9rieures \u00e0 2.67",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-40417",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40417"
},
{
"name": "CVE-2026-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-42898"
},
{
"name": "CVE-2026-41612",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41612"
},
{
"name": "CVE-2026-40365",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40365"
},
{
"name": "CVE-2026-41614",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41614"
},
{
"name": "CVE-2026-41602",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41602"
},
{
"name": "CVE-2026-42833",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-42833"
},
{
"name": "CVE-2026-40368",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40368"
},
{
"name": "CVE-2026-32175",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32175"
},
{
"name": "CVE-2026-33110",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33110"
},
{
"name": "CVE-2026-41613",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41613"
},
{
"name": "CVE-2026-41094",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41094"
},
{
"name": "CVE-2026-6665",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6665"
},
{
"name": "CVE-2026-40357",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40357"
},
{
"name": "CVE-2026-41603",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41603"
},
{
"name": "CVE-2026-35439",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-35439"
},
{
"name": "CVE-2026-40367",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40367"
},
{
"name": "CVE-2026-6667",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6667"
},
{
"name": "CVE-2026-6664",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6664"
},
{
"name": "CVE-2026-32177",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32177"
},
{
"name": "CVE-2026-40370",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40370"
},
{
"name": "CVE-2026-41636",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41636"
},
{
"name": "CVE-2026-41109",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41109"
},
{
"name": "CVE-2026-44656",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-44656"
},
{
"name": "CVE-2026-6666",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6666"
},
{
"name": "CVE-2026-41611",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41611"
},
{
"name": "CVE-2026-40374",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40374"
},
{
"name": "CVE-2026-41605",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41605"
},
{
"name": "CVE-2026-41103",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41103"
},
{
"name": "CVE-2026-33112",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33112"
},
{
"name": "CVE-2026-32185",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32185"
},
{
"name": "CVE-2026-45130",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-45130"
},
{
"name": "CVE-2025-48431",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48431"
},
{
"name": "CVE-2026-41610",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41610"
}
],
"initial_release_date": "2026-05-13T00:00:00",
"last_revision_date": "2026-05-13T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0588",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-05-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-33110",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33110"
},
{
"published_at": "2026-05-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-6664",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6664"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-32185",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32185"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-41602",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41602"
},
{
"published_at": "2026-05-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-45130",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-45130"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-48431",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48431"
},
{
"published_at": "2026-05-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-6665",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6665"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-41103",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41103"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-35439",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35439"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-32177",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32177"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-41610",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41610"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-40417",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40417"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-42898",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42898"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-41614",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41614"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-41612",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41612"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-40374",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40374"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-41636",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41636"
},
{
"published_at": "2026-05-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-44656",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-44656"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-32175",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32175"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-40370",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40370"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-40368",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40368"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-41605",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41605"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-41611",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41611"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-41109",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41109"
},
{
"published_at": "2026-05-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-6667",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6667"
},
{
"published_at": "2026-05-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-6666",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6666"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-40365",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40365"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-33112",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33112"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-40357",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40357"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-41094",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41094"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-41603",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41603"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-42833",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42833"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-41613",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41613"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-40367",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40367"
}
]
}
bit-pgbouncer-2026-6667
Vulnerability from bitnami_vulndb
PgBouncer before 1.25.2 did not perform an appropriate authorization check for the KILL_CLIENT admin command. All users with access to the administration console (which itself requires authorization) could run this command. It would have been correct to allow only users listed in the admin_users parameter.
{
"affected": [
{
"package": {
"ecosystem": "Bitnami",
"name": "pgbouncer",
"purl": "pkg:bitnami/pgbouncer"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.25.2"
}
],
"type": "SEMVER"
}
],
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"type": "CVSS_V3"
}
]
}
],
"aliases": [
"CVE-2026-6667"
],
"database_specific": {
"cpes": [
"cpe:2.3:a:pgbouncer:pgbouncer:*:*:*:*:*:*:*:*"
],
"severity": "Medium"
},
"details": "PgBouncer before 1.25.2 did not perform an appropriate authorization check for the KILL_CLIENT admin command. All users with access to the administration console (which itself requires authorization) could run this command. It would have been correct to allow only users listed in the admin_users parameter.",
"id": "BIT-pgbouncer-2026-6667",
"modified": "2026-05-12T09:14:35.689Z",
"published": "2026-05-12T08:52:54.700Z",
"references": [
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-6667"
},
{
"type": "WEB",
"url": "https://www.pgbouncer.org/changelog.html#pgbouncer-125x"
}
],
"schema_version": "1.6.2",
"summary": "PgBouncer missing authorization check in KILL_CLIENT admin command"
}
MSRC_CVE-2026-6667
Vulnerability from csaf_microsoft - Published: 2026-05-02 00:00 - Updated: 2026-05-13 01:42| URL | Category |
|---|---|
| https://msrc.microsoft.com/csaf/vex/2026/msrc_cve… | self |
| https://support.microsoft.com/lifecycle | external |
| https://www.first.org/cvss | external |
| https://msrc.microsoft.com/csaf/vex/2026/msrc_cve… | self |
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2026-6667 PgBouncer missing authorization check in KILL_CLIENT admin command - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-6667.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "PgBouncer missing authorization check in KILL_CLIENT admin command",
"tracking": {
"current_release_date": "2026-05-13T01:42:50.000Z",
"generator": {
"date": "2026-05-13T07:31:15.231Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2026-6667",
"initial_release_date": "2026-05-02T00:00:00.000Z",
"revision_history": [
{
"date": "2026-05-10T01:01:32.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2026-05-11T14:43:35.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
},
{
"date": "2026-05-13T01:42:50.000Z",
"legacy_version": "3",
"number": "3",
"summary": "Information published."
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 pgbouncer 0:1.25.1-1.azl3",
"product": {
"name": "\u003cazl3 pgbouncer 0:1.25.1-1.azl3",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "azl3 pgbouncer 0:1.25.1-1.azl3",
"product": {
"name": "azl3 pgbouncer 0:1.25.1-1.azl3",
"product_id": "21328"
}
}
],
"category": "product_name",
"name": "pgbouncer"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 pgbouncer 0:1.25.1-1.azl3 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 pgbouncer 0:1.25.1-1.azl3 as a component of Azure Linux 3.0",
"product_id": "21328-17084"
},
"product_reference": "21328",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-6667",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "general",
"text": "PostgreSQL",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"21328-17084"
],
"known_affected": [
"17084-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-6667 PgBouncer missing authorization check in KILL_CLIENT admin command - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-6667.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-10T01:01:32.000Z",
"details": "0:1.25.2-1.azl3:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 4.3,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"17084-1"
]
}
],
"title": "PgBouncer missing authorization check in KILL_CLIENT admin command"
}
]
}
WID-SEC-W-2026-1445
Vulnerability from csaf_certbund - Published: 2026-05-10 22:00 - Updated: 2026-05-12 22:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Open Source PgBouncer <1.25.2
Open Source / PgBouncer
|
<1.25.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Open Source PgBouncer <1.25.2
Open Source / PgBouncer
|
<1.25.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Open Source PgBouncer <1.25.2
Open Source / PgBouncer
|
<1.25.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Open Source PgBouncer <1.25.2
Open Source / PgBouncer
|
<1.25.2 |
| URL | Category |
|---|---|
| https://wid.cert-bund.de/.well-known/csaf/white/2… | self |
| https://wid.cert-bund.de/portal/wid/securityadvis… | self |
| https://www.pgbouncer.org/changelog.html | external |
| https://github.com/advisories/GHSA-PMGP-Q838-FH9G | external |
| https://github.com/advisories/GHSA-MHMX-MJV6-W337 | external |
| https://github.com/advisories/GHSA-4463-8RVF-RJ9F | external |
| https://github.com/advisories/GHSA-GC77-JRV9-6FJP | external |
| https://msrc.microsoft.com/update-guide/ | external |
| https://github.com/nicolasjulian/bouncer-overflow | external |
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "PgBouncer ist ein leichtgewichtiger Connection-Pooler f\u00fcr PostgreSQL",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in PgBouncer ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-1445 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1445.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-1445 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1445"
},
{
"category": "external",
"summary": "PgBouncer changelog vom 2026-05-10",
"url": "https://www.pgbouncer.org/changelog.html"
},
{
"category": "external",
"summary": "GitHub Advisory Database vom 2026-05-10",
"url": "https://github.com/advisories/GHSA-PMGP-Q838-FH9G"
},
{
"category": "external",
"summary": "GitHub Advisory Database vom 2026-05-10",
"url": "https://github.com/advisories/GHSA-MHMX-MJV6-W337"
},
{
"category": "external",
"summary": "GitHub Advisory Database vom 2026-05-10",
"url": "https://github.com/advisories/GHSA-4463-8RVF-RJ9F"
},
{
"category": "external",
"summary": "GitHub Advisory Database vom 2026-05-10",
"url": "https://github.com/advisories/GHSA-GC77-JRV9-6FJP"
},
{
"category": "external",
"summary": "Microsoft Security Update Guide vom 2026-05-12",
"url": "https://msrc.microsoft.com/update-guide/"
},
{
"category": "external",
"summary": "PoC CVE-2026-6664 vom 2026-05-12",
"url": "https://github.com/nicolasjulian/bouncer-overflow"
}
],
"source_lang": "en-US",
"title": "PgBouncer: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-05-12T22:00:00.000+00:00",
"generator": {
"date": "2026-05-12T18:55:58.723+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-1445",
"initial_release_date": "2026-05-10T22:00:00.000+00:00",
"revision_history": [
{
"date": "2026-05-10T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-05-11T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2026-05-12T22:00:00.000+00:00",
"number": "3",
"summary": "PoC f\u00fcr CVE-2026-6664 aufgenommen"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "azl3",
"product": {
"name": "Microsoft Azure Linux azl3",
"product_id": "T049210",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:azure_linux:azl3"
}
}
}
],
"category": "product_name",
"name": "Azure Linux"
}
],
"category": "vendor",
"name": "Microsoft"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.25.2",
"product": {
"name": "Open Source PgBouncer \u003c1.25.2",
"product_id": "T053762"
}
},
{
"category": "product_version",
"name": "1.25.2",
"product": {
"name": "Open Source PgBouncer 1.25.2",
"product_id": "T053762-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:open_source:pgbouncer:1.25.2"
}
}
}
],
"category": "product_name",
"name": "PgBouncer"
}
],
"category": "vendor",
"name": "Open Source"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-6664",
"product_status": {
"known_affected": [
"T049210",
"T053762"
]
},
"release_date": "2026-05-10T22:00:00.000+00:00",
"title": "CVE-2026-6664"
},
{
"cve": "CVE-2026-6665",
"product_status": {
"known_affected": [
"T049210",
"T053762"
]
},
"release_date": "2026-05-10T22:00:00.000+00:00",
"title": "CVE-2026-6665"
},
{
"cve": "CVE-2026-6666",
"product_status": {
"known_affected": [
"T049210",
"T053762"
]
},
"release_date": "2026-05-10T22:00:00.000+00:00",
"title": "CVE-2026-6666"
},
{
"cve": "CVE-2026-6667",
"product_status": {
"known_affected": [
"T049210",
"T053762"
]
},
"release_date": "2026-05-10T22:00:00.000+00:00",
"title": "CVE-2026-6667"
}
]
}
GHSA-GC77-JRV9-6FJP
Vulnerability from github – Published: 2026-05-09 03:31 – Updated: 2026-05-09 03:31PgBouncer before 1.25.2 did not perform an appropriate authorization check for the KILL_CLIENT admin command. All users with access to the administration console (which itself requires authorization) could run this command. It would have been correct to allow only users listed in the admin_users parameter.
{
"affected": [],
"aliases": [
"CVE-2026-6667"
],
"database_specific": {
"cwe_ids": [
"CWE-862"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-05-09T01:16:09Z",
"severity": "MODERATE"
},
"details": "PgBouncer before 1.25.2 did not perform an appropriate authorization check for the KILL_CLIENT admin command. All users with access to the administration console (which itself requires authorization) could run this command. It would have been correct to allow only users listed in the admin_users parameter.",
"id": "GHSA-gc77-jrv9-6fjp",
"modified": "2026-05-09T03:31:22Z",
"published": "2026-05-09T03:31:22Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-6667"
},
{
"type": "WEB",
"url": "https://www.pgbouncer.org/changelog.html#pgbouncer-125x"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.