Vulnerabilities > Deno
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-02-25 | CVE-2023-26103 | Unspecified vulnerability in Deno Versions of the package deno before 1.31.0 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the upgradeWebSocket function, which contains regexes in the form of /s*,s*/, used for splitting the Connection/Upgrade header. | 7.5 |
2023-01-17 | CVE-2023-22499 | Unspecified vulnerability in Deno Deno is a runtime for JavaScript and TypeScript that uses V8 and is built in Rust. | 7.5 |
2022-06-12 | CVE-2021-41641 | Link Following vulnerability in Deno Deno <=1.14.0 file sandbox does not handle symbolic links correctly. | 8.4 |
2022-03-25 | CVE-2022-24783 | Incorrect Authorization vulnerability in Deno Deno is a runtime for JavaScript and TypeScript. | 10.0 |
2021-10-11 | CVE-2021-42139 | Code Injection vulnerability in Deno Standard Modules Deno Standard Modules before 0.107.0 allows Code Injection via an untrusted YAML file in certain configurations. | 9.8 |
2021-05-28 | CVE-2021-32619 | Incorrect Authorization vulnerability in Deno Deno is a runtime for JavaScript and TypeScript that uses V8 and is built in Rust. | 9.8 |