logo
Vulnerability feed
CONTRIBUTE

Vulnerability

warn

CVE-2024-27931

Reference to the description:

https://nvd.nist.gov/vuln/detail/CVE-2024-27931

Description:
Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. Insufficient validation of parameters in `Deno.makeTemp*` APIs would allow for creation of files outside of the allowed directories. This may allow the user to overwrite important files on the system that may affect other systems. A user may provide a prefix or suffix to a `Deno.makeTemp*` API containing path traversal characters. This is fixed in Deno 1.41.1.
Last updated date:
01/03/2025
Type:
exploit
Confidence:
HIGH
Date of publishing:
01/03/2025
Reference url to background

https://github.com/denoland/deno/security/advisories/GHSA-hrqr-jv8w-v9jh

Vulnerability FeedContributorsAboutBlog

@inTheWild

©2025

Privacy Policy