| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2024-27934 | *const c_void / ExternalPointer unsoundness leading to use-after-free | denoland | deno | High | 8.4 | 2024-03-06 20:56:39 | Deep Dive |
| CVE-2024-27933 | Deno arbitrary file descriptor close via `op_node_ipc_pipe()` leading to permission prompt bypass | denoland | deno | High | 8.2 | 2024-03-06 20:52:18 | Deep Dive |
| CVE-2024-27932 | Deno's improper suffix match testing for DENO_AUTH_TOKENS | denoland | deno | Medium | 4.6 | 2024-03-06 20:45:16 | Deep Dive |
| CVE-2024-27931 | Insufficient permission checking in `Deno.makeTemp*` APIs | denoland | deno | Medium | 5.8 | 2024-03-05 16:43:12 | Deep Dive |
| CVE-2023-33966 | Deno missing "--allow-net" permission check for built-in Node modules | denoland | deno | High | 8.6 | 2023-05-31 17:15:14 | Deep Dive |
| CVE-2023-28446 | Deno is vulnerable to interactive `run` permission prompt spoofing via improper ANSI neutralization | denoland | deno | High | 8.8 | 2023-03-24 19:46:29 | Deep Dive |
| CVE-2023-28445 | Deno improperly handles resizable ArrayBuffer | denoland | deno | Critical | 9.9 | 2023-03-23 23:23:28 | Deep Dive |
| CVE-2023-22499 | Interactive permission prompt spoofing in Deno | denoland | deno | High | 7.5 | 2023-01-17 20:23:21 | Deep Dive |
| CVE-2022-24783 | Sandbox bypass leading to arbitrary code execution in Deno | denoland | deno | Critical | 10.0 | 2022-03-25 21:15:12 | Deep Dive |
| CVE-2021-32619 | Static imports inside dynamically imported modules do not adhere to permission checks | denoland | deno | Critical | 9.8 | 2021-05-28 21:00:12 | Deep Dive |