{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-16T16:43:59.867","vulnerabilities":[{"cve":{"id":"CVE-2023-22332","sourceIdentifier":"vultures@jpcert.or.jp","published":"2023-01-30T07:15:10.003","lastModified":"2025-11-03T22:16:04.730","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Information disclosure vulnerability exists in Pgpool-II 4.4.0 to 4.4.1 (4.4 series), 4.3.0 to 4.3.4 (4.3 series), 4.2.0 to 4.2.11 (4.2 series), 4.1.0 to 4.1.14 (4.1 series), 4.0.0 to 4.0.21 (4.0 series), All versions of 3.7 series, All versions of 3.6 series, All versions of 3.5 series, All versions of 3.4 series, and All versions of 3.3 series. A specific database user's authentication information may be obtained by another database user. As a result, the information stored in the database may be altered and/or database may be suspended by a remote attacker who successfully logged in the product with the obtained credentials."},{"lang":"es","value":"Una vulnerabilidad de divulgación de información existe en Pgpool-II 4.4.0 a 4.4.1 (serie 4.4), 4.3.0 a 4.3.4 (serie 4.3), 4.2.0 a 4.2.11 (serie 4.2), 4.1.0 a 4.1. 14 (serie 4.1), 4.0.0 a 4.0.21 (serie 4.0), Todas las versiones de la serie 3.7, Todas las versiones de la serie 3.6, Todas las versiones de la serie 3.5, Todas las versiones de la serie 3.4 y Todas las versiones de la serie 3.3. La información de autenticación de un usuario de base de datos específico puede ser obtenida por otro usuario de base de datos. Como resultado, la información almacenada en la base de datos puede verse alterada y/o la base de datos puede ser suspendida por un atacante remoto que haya iniciado sesión exitosamente en el producto con las credenciales obtenidas."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-312"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-312"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:pgpool:pgpool-ii:*:*:*:*:*:*:*:*","versionStartIncluding":"3.3.0","versionEndIncluding":"3.7.12","matchCriteriaId":"AC6F9DF2-27FB-43BE-B4EB-5296C01BD28E"},{"vulnerable":true,"criteria":"cpe:2.3:a:pgpool:pgpool-ii:*:*:*:*:*:*:*:*","versionStartIncluding":"4.0.0","versionEndExcluding":"4.0.22","matchCriteriaId":"AEFBFF5E-DE69-4F94-B4BD-53C8C91CA850"},{"vulnerable":true,"criteria":"cpe:2.3:a:pgpool:pgpool-ii:*:*:*:*:*:*:*:*","versionStartIncluding":"4.1.0","versionEndExcluding":"4.1.15","matchCriteriaId":"1800AB14-AF70-4D4D-8E3D-FCFC7790F1FC"},{"vulnerable":true,"criteria":"cpe:2.3:a:pgpool:pgpool-ii:*:*:*:*:*:*:*:*","versionStartIncluding":"4.2.0","versionEndExcluding":"4.2.12","matchCriteriaId":"3D3373F7-66DD-4A05-B7AF-8ABEAF99F4F9"},{"vulnerable":true,"criteria":"cpe:2.3:a:pgpool:pgpool-ii:*:*:*:*:*:*:*:*","versionStartIncluding":"4.3.0","versionEndExcluding":"4.3.5","matchCriteriaId":"AA369670-DE4B-478A-87C8-57A60929B885"},{"vulnerable":true,"criteria":"cpe:2.3:a:pgpool:pgpool-ii:*:*:*:*:*:*:*:*","versionStartIncluding":"4.4.0","versionEndExcluding":"4.4.2","matchCriteriaId":"7A6FBCE3-2494-4B70-A094-289DE7AC6D64"}]}]}],"references":[{"url":"https://jvn.jp/en/jp/JVN72418815/","source":"vultures@jpcert.or.jp","tags":["Third Party Advisory"]},{"url":"https://www.pgpool.net/mediawiki/index.php/Main_Page#News","source":"vultures@jpcert.or.jp","tags":["Vendor Advisory"]},{"url":"https://jvn.jp/en/jp/JVN72418815/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/12/msg00015.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.pgpool.net/mediawiki/index.php/Main_Page#News","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}