Vigilance.fr - Pgpool-II: user access via Authentication Information, analyzed on 13/12/2024
An attacker can bypass restrictions of Pgpool-II, via Authentication Information, in order to gain user privileges. - Security Vulnerability

An attacker can bypass restrictions of Pgpool-II, via Authentication Information, in order to gain user privileges.