Vulnerabilities > Deno > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-03-21 | CVE-2024-27933 | Incorrect Authorization vulnerability in Deno 1.39.0 Deno is a JavaScript, TypeScript, and WebAssembly runtime. | 8.8 |
2024-03-21 | CVE-2024-27934 | Use After Free vulnerability in Deno Deno is a JavaScript, TypeScript, and WebAssembly runtime. | 8.8 |
2024-03-21 | CVE-2024-27935 | Unspecified vulnerability in Deno Deno is a JavaScript, TypeScript, and WebAssembly runtime. | 8.3 |
2023-03-24 | CVE-2023-28446 | Unspecified vulnerability in Deno Deno is a simple, modern and secure runtime for JavaScript and TypeScript that uses V8 and is built in Rust. | 8.8 |
2023-02-25 | CVE-2023-26103 | Unspecified vulnerability in Deno Versions of the package deno before 1.31.0 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the upgradeWebSocket function, which contains regexes in the form of /s*,s*/, used for splitting the Connection/Upgrade header. | 7.5 |
2023-01-17 | CVE-2023-22499 | Unspecified vulnerability in Deno Deno is a runtime for JavaScript and TypeScript that uses V8 and is built in Rust. | 7.5 |
2022-06-12 | CVE-2021-41641 | Link Following vulnerability in Deno Deno <=1.14.0 file sandbox does not handle symbolic links correctly. | 8.4 |