Lucene search

K
DenoDeno

4 matches found

CVE
CVE
added 2023/01/17 9:15 p.m.354 views

CVE-2023-22499

Deno is a runtime for JavaScript and TypeScript that uses V8 and is built in Rust. Multi-threaded programs were able to spoof interactive permission prompt by rewriting the prompt to suggest that program is waiting on user confirmation to unrelated action. A malicious program could clear the termin...

7.5CVSS7.3AI score0.0007EPSS
CVE
CVE
added 2024/06/06 4:15 p.m.217 views

CVE-2024-37150

An issue in .npmrc support in Deno 1.44.0 was discovered where Deno would send .npmrc credentials for the scope to the tarball URL when the registry provided URLs for a tarball on a different domain. All users relying on .npmrc are potentially affected by this vulnerability if their private registr...

7.6CVSS6.8AI score0.00219EPSS
CVE
CVE
added 2024/04/18 8:15 p.m.55 views

CVE-2024-32477

Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. By using ANSI escape sequences and a race between libc::tcflush(0, libc::TCIFLUSH) and reading standard input, it's possible to manipulate the permission prompt and force it to allow an unsafe action regardless of the u...

7.7CVSS6.6AI score0.00019EPSS
CVE
CVE
added 2023/02/25 5:15 a.m.48 views

CVE-2023-26103

Versions of the package deno before 1.31.0 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the upgradeWebSocket function, which contains regexes in the form of /s*,s*/, used for splitting the Connection/Upgrade header. A specially crafted Connection/Upgrade header can be used ...

7.5CVSS7.5AI score0.00092EPSS