Deno

Deno

29 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.25%
  • Veröffentlicht 05.03.2024 17:15:07
  • Zuletzt bearbeitet 03.01.2025 19:29:35

Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. Insufficient validation of parameters in `Deno.makeTemp*` APIs would allow for creation of files outside of the allowed directories. This may allow the user to overwrite ...

  • EPSS 0.18%
  • Veröffentlicht 31.05.2023 18:15:09
  • Zuletzt bearbeitet 21.11.2024 08:06:18

Deno is a runtime for JavaScript and TypeScript. In deno 1.34.0 and deno_runtime 0.114.0, outbound HTTP requests made using the built-in `node:http` or `node:https` modules are incorrectly not checked against the network permission allow list (`--all...

Exploit
  • EPSS 1.65%
  • Veröffentlicht 24.03.2023 20:15:15
  • Zuletzt bearbeitet 21.11.2024 07:55:05

Deno is a simple, modern and secure runtime for JavaScript and TypeScript that uses V8 and is built in Rust. Arbitrary program names without any ANSI filtering allows any malicious program to clear the first 2 lines of a `op_spawn_child` or `op_kill`...

  • EPSS 0.38%
  • Veröffentlicht 24.03.2023 00:15:15
  • Zuletzt bearbeitet 21.11.2024 07:55:05

Deno is a runtime for JavaScript and TypeScript that uses V8 and is built in Rust. Resizable ArrayBuffers passed to asynchronous functions that are shrunk during the asynchronous operation could result in an out-of-bound read/write. It is unlikely th...

Exploit
  • EPSS 0.15%
  • Veröffentlicht 25.02.2023 05:15:12
  • Zuletzt bearbeitet 11.03.2025 16:15:14

Versions of the package deno before 1.31.0 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the upgradeWebSocket function, which contains regexes in the form of /s*,s*/, used for splitting the Connection/Upgrade header. A special...

Exploit
  • EPSS 0.34%
  • Veröffentlicht 17.01.2023 21:15:15
  • Zuletzt bearbeitet 21.11.2024 07:44:55

Deno is a runtime for JavaScript and TypeScript that uses V8 and is built in Rust. Multi-threaded programs were able to spoof interactive permission prompt by rewriting the prompt to suggest that program is waiting on user confirmation to unrelated a...

Exploit
  • EPSS 0.13%
  • Veröffentlicht 12.06.2022 13:15:07
  • Zuletzt bearbeitet 21.11.2024 06:26:33

Deno <=1.14.0 file sandbox does not handle symbolic links correctly. When running Deno with specific write access, the Deno.symlink method can be used to gain access to any directory.

  • EPSS 0.36%
  • Veröffentlicht 25.03.2022 22:15:08
  • Zuletzt bearbeitet 21.11.2024 06:51:05

Deno is a runtime for JavaScript and TypeScript. The versions of Deno between release 1.18.0 and 1.20.2 (inclusive) are vulnerable to an attack where a malicious actor controlling the code executed in a Deno runtime could bypass all permission checks...

  • EPSS 0.36%
  • Veröffentlicht 28.05.2021 21:15:08
  • Zuletzt bearbeitet 21.11.2024 06:07:23

Deno is a runtime for JavaScript and TypeScript that uses V8 and is built in Rust. In Deno versions 1.5.0 to 1.10.1, modules that are dynamically imported through `import()` or `new Worker` might have been able to bypass network and file system permi...