Deno

Deno

29 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.78%
  • Veröffentlicht 20.02.2026 20:52:11
  • Zuletzt bearbeitet 02.03.2026 13:35:52

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Prior to 2.6.8, a command injection vulnerability exists in Deno's node:child_process implementation. This vulnerability is fixed in 2.6.8.

Exploit
  • EPSS 0.03%
  • Veröffentlicht 15.01.2026 22:58:52
  • Zuletzt bearbeitet 21.01.2026 14:32:39

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Before 2.5.6, a prior patch aimed to block spawning Windows batch/shell files by returning an error when a spawned path’s extension matched .bat or .cmd. That check performs a case-sensitive ...

Exploit
  • EPSS 0.01%
  • Veröffentlicht 15.01.2026 22:53:15
  • Zuletzt bearbeitet 21.01.2026 14:35:52

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Before 2.6.0, node:crypto doesn't finalize cipher. The vulnerability allows an attacker to have infinite encryptions. This can lead to naive attempts at brute forcing, as well as more refined...

Exploit
  • EPSS 0.17%
  • Veröffentlicht 08.10.2025 00:59:17
  • Zuletzt bearbeitet 16.10.2025 18:14:53

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Versions prior to 2.5.3 and 2.2.15 are vulnerable to Command Line Injection attacks on Windows when batch files are executed. In Windows, ``CreateProcess()`` always implicitly spawns ``cmd.ex...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 08.10.2025 00:49:42
  • Zuletzt bearbeitet 16.10.2025 18:13:38

Deno is a JavaScript, TypeScript, and WebAssembly runtime. In versions prior to 2.5.3 and 2.2.15, `Deno.FsFile.prototype.stat` and `Deno.FsFile.prototype.statSync` are not limited by the permission model check `--deny-read=./`. It's possible to retri...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 08.10.2025 00:37:01
  • Zuletzt bearbeitet 16.10.2025 18:12:40

Deno is a JavaScript, TypeScript, and WebAssembly runtime. In versions prior to 2.5.3 and 2.2.15, `Deno.FsFile.prototype.utime` and `Deno.FsFile.prototype.utimeSync` are not limited by the permission model check `--deny-write=./`. It's possible to ch...

Exploit
  • EPSS 0.11%
  • Veröffentlicht 04.06.2025 19:31:26
  • Zuletzt bearbeitet 02.07.2025 13:17:12

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 2.2.0 and prior to versions 2.2.5, it is possible to bypass Deno's permission read/write db permission check by using `ATTACH DATABASE` statement. Version 2.2.5 contains a...

Exploit
  • EPSS 0.11%
  • Veröffentlicht 04.06.2025 19:21:17
  • Zuletzt bearbeitet 02.07.2025 13:43:10

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Prior to versions 2.1.13 and 2.2.13, the `Deno.env.toObject` method ignores any variables listed in the `--deny-env` option of the `deno run` command. When looking at the documentation of the...

Exploit
  • EPSS 0.08%
  • Veröffentlicht 04.06.2025 19:15:55
  • Zuletzt bearbeitet 02.07.2025 14:05:20

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 1.41.3 and prior to versions 2.1.13, 2.2.13, and 2.3.2, `deno run --allow-read --deny-read main.ts` results in allowed, even though 'deny' should be stronger. The result i...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 03.06.2025 22:48:52
  • Zuletzt bearbeitet 09.06.2025 15:11:33

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Versions 1.46.0 through 2.1.6 have an issue that affects AES-256-GCM and AES-128-GCM in Deno in which the authentication tag is not being validated. This means tampered ciphertexts or incorre...