Lucene search

K

4 matches found

CVE
CVE
added 2025/06/04 8:15 p.m.53 views

CVE-2025-48934

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Prior to versions 2.1.13 and 2.2.13, the Deno.env.toObject method ignores any variables listed in the --deny-env option of the deno run command. When looking at the documentation of the --deny-env option this might lead to a false impressio...

6.9CVSS6.5AI score0.00058EPSS
CVE
CVE
added 2025/06/03 11:15 p.m.42 views

CVE-2025-24015

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Versions 1.46.0 through 2.1.6 have an issue that affects AES-256-GCM and AES-128-GCM in Deno in which the authentication tag is not being validated. This means tampered ciphertexts or incorrect keys might not be detected, which breaks the g...

8.7CVSS6.6AI score0.00087EPSS
CVE
CVE
added 2025/06/04 8:15 p.m.39 views

CVE-2025-48888

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 1.41.3 and prior to versions 2.1.13, 2.2.13, and 2.3.2, deno run --allow-read --deny-read main.ts results in allowed, even though 'deny' should be stronger. The result is the same with all global unary permissions given ...

6.9CVSS6.5AI score0.00046EPSS
CVE
CVE
added 2025/06/04 8:15 p.m.37 views

CVE-2025-48935

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 2.2.0 and prior to versions 2.2.5, it is possible to bypass Deno's permission read/write db permission check by using ATTACH DATABASE statement. Version 2.2.5 contains a patch for the issue.

9.1CVSS6.9AI score0.00058EPSS