Deno is a runtime for JavaScript and TypeScript that uses V8 and is built in Rust. In Deno versions 1.5.0 to 1.10.1, modules that are dynamically imported through `import()` or `new Worker` might have been able to bypass network and file system permission checks when statically importing other modules. The vulnerability has been patched in Deno release 1.10.2.
References
Link | Resource |
---|---|
https://github.com/denoland/deno/security/advisories/GHSA-xpwj-7v8q-mcgj | Third Party Advisory |
Configurations
History
05 Aug 2022, 12:36
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-863 |
08 Jun 2021, 17:07
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-285 | |
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
References | (CONFIRM) https://github.com/denoland/deno/security/advisories/GHSA-xpwj-7v8q-mcgj - Third Party Advisory | |
CPE | cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:* |
28 May 2021, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-05-28 21:15
Updated : 2024-02-04 21:47
NVD link : CVE-2021-32619
Mitre link : CVE-2021-32619
CVE.ORG link : CVE-2021-32619
JSON object : View
Products Affected
deno
- deno