Deno is a runtime for JavaScript and TypeScript that uses V8 and is built in Rust. In Deno versions 1.5.0 to 1.10.1, modules that are dynamically imported through `import()` or `new Worker` might have been able to bypass network and file system permission checks when statically importing other modules. The vulnerability has been patched in Deno release 1.10.2.
References
Link | Resource |
---|---|
https://github.com/denoland/deno/security/advisories/GHSA-xpwj-7v8q-mcgj | Third Party Advisory |
https://github.com/denoland/deno/security/advisories/GHSA-xpwj-7v8q-mcgj | Third Party Advisory |
Configurations
History
21 Nov 2024, 06:07
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/denoland/deno/security/advisories/GHSA-xpwj-7v8q-mcgj - Third Party Advisory |
Information
Published : 2021-05-28 21:15
Updated : 2024-11-21 06:07
NVD link : CVE-2021-32619
Mitre link : CVE-2021-32619
CVE.ORG link : CVE-2021-32619
JSON object : View
Products Affected
deno
- deno