Deno

Deno

29 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.25%
  • Veröffentlicht 06.01.2025 23:15:07
  • Zuletzt bearbeitet 06.01.2025 23:15:07

Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. When you send a request with the Authorization header to one domain, and the response asks to redirect to a different domain, Deno'sfetch() redirect handling creates a fo...

  • EPSS 0.09%
  • Veröffentlicht 25.11.2024 19:15:09
  • Zuletzt bearbeitet 25.11.2024 19:15:09

Deno is a runtime for JavaScript and TypeScript written in rust. Several cross-site scripting vulnerabilities existed in the `deno_doc` crate which lead to Self-XSS with deno doc --html. 1.) XSS in generated `search_index.js`, `deno_doc` outputs a Ja...

  • EPSS 0.45%
  • Veröffentlicht 06.06.2024 16:15:12
  • Zuletzt bearbeitet 21.11.2024 09:23:18

An issue in `.npmrc` support in Deno 1.44.0 was discovered where Deno would send `.npmrc` credentials for the scope to the tarball URL when the registry provided URLs for a tarball on a different domain. All users relying on .npmrc are potentially af...

  • EPSS 0.1%
  • Veröffentlicht 07.05.2024 21:15:09
  • Zuletzt bearbeitet 04.09.2025 19:23:06

Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. The Deno sandbox may be unexpectedly weakened by allowing file read/write access to privileged files in various locations on Unix and Windows platforms. For example, read...

Exploit
  • EPSS 0.2%
  • Veröffentlicht 18.04.2024 20:15:17
  • Zuletzt bearbeitet 04.09.2025 15:16:44

Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. By using ANSI escape sequences and a race between `libc::tcflush(0, libc::TCIFLUSH)` and reading standard input, it's possible to manipulate the permission prompt and for...

Exploit
  • EPSS 0.44%
  • Veröffentlicht 21.03.2024 02:52:22
  • Zuletzt bearbeitet 03.01.2025 19:27:46

Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. Starting in version 1.32.1 and prior to version 1.41.0 of the deno library, maliciously crafted permission request can show the spoofed permission prompt by inserting a b...

Exploit
  • EPSS 0.3%
  • Veröffentlicht 21.03.2024 02:52:22
  • Zuletzt bearbeitet 03.01.2025 19:25:19

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 1.35.1 and prior to version 1.36.3, a vulnerability in Deno's Node.js compatibility runtime allows for cross-session data contamination during simultaneous asynchronous re...

Exploit
  • EPSS 0.21%
  • Veröffentlicht 21.03.2024 02:52:22
  • Zuletzt bearbeitet 03.01.2025 19:23:57

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 1.36.2 and prior to version 1.40.3, use of inherently unsafe `*const c_void` and `ExternalPointer` leads to use-after-free access of the underlying structure, resulting in...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 21.03.2024 02:52:22
  • Zuletzt bearbeitet 03.01.2025 19:23:04

Deno is a JavaScript, TypeScript, and WebAssembly runtime. In version 1.39.0, use of raw file descriptors in `op_node_ipc_pipe()` leads to premature close of arbitrary file descriptors, allowing standard input to be re-opened as a different resource ...

Exploit
  • EPSS 0.47%
  • Veröffentlicht 21.03.2024 02:52:21
  • Zuletzt bearbeitet 03.01.2025 19:19:52

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 1.8.0 and prior to version 1.40.4, Deno improperly checks that an import specifier's hostname is equal to or a child of a token's hostname, which can cause tokens to be se...