Skip to main content
Skip table of contents

TSM Data Interface

Status as of

CVE ID

Severity

Package

Details

Summary

Mitigation

CVE-2024-32655 HighNpgsqlhttps://github.com/advisories/GHSA-x9vc-6hfv-hg8c

The WriteBind() method in src/Npgsql/Internal/NpgsqlConnector.FrontendMessages.cs uses int variables to store the message length and the sum of parameter lengths. Both variables overflow when the sum of parameter lengths becomes too large.

This causes Npgsql to write a message size that is too small when constructing a Postgres protocol message to send it over the network to the database. When parsing the message, the database will only read a small number of bytes and treat any following bytes as new messages while they belong to the old message.

Attackers can abuse this to inject arbitrary Postgres protocol messages into the connection, leading to the execution of arbitrary SQL statements on the application's behalf.


CVE-2024-30105

HighSystem.Text.Jsonhttps://github.com/advisories/GHSA-hh2w-p6rv-4g7w

Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 8.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.

A vulnerability exists in .NET when calling the JsonSerializer.DeserializeAsyncEnumerable method against an untrusted input using System.Text.Json may result in Denial of Service.


CVE-2024-43485

HighSystem.Text.Jsonhttps://github.com/advisories/GHSA-8g4q-xg66-9fp4

Microsoft is releasing this security advisory to provide information about a vulnerability in System.Text.Json 6.0.x and 8.0.x. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.

In System.Text.Json 6.0.x and 8.0.x, applications which deserialize input to a model with an [ExtensionData] property can be vulnerable to an algorithmic complexity attack resulting in Denial of Service.


JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.