Ecosyste.ms: Packages

An open API service providing package, version and dependency metadata of many open source software ecosystems and registries.

Top 5.4% on crates.io
Top 6.1% downloads on crates.io
Top 6.2% dependent packages on crates.io
Top 0.1% forks on crates.io
Top 3.2% docker downloads on crates.io

crates.io : deno

Provides the deno executable

Registry - Source - Documentation - JSON
purl: pkg:cargo/deno
Keywords: deno, javascript, rust, typescript
License: MIT
Latest release: 3 days ago
First release: over 5 years ago
Dependent packages: 5
Dependent repositories: 1
Downloads: 155,305 total
Stars: 92,893 on GitHub
Forks: 5,128 on GitHub
Docker dependents: 6
Docker downloads: 451
Total Commits: 9165
Committers: 850
Average commits per author: 10.782
Development Distribution Score (DDS): 0.846
More commit stats: commits.ecosyste.ms
See more repository details: repos.ecosyste.ms
Last synced: 3 days ago

Moderate
GSA_kwCzR0hTQS01ZnJ3LTRyd3EteGhjcs4AA5zP
Deno's improper suffix match testing for DENO_AUTH_TOKENS
Ecosystems: cargo
Packages: deno
Source: github
Published: 2 months ago
Critical
GSA_kwCzR0hTQS14cHdqLTd2OHEtbWNnas0V-g
Deno's static imports inside dynamically imported modules do not adhere to permission checks
Ecosystems: cargo
Packages: deno
Source: github
Published: over 2 years ago
High
GSA_kwCzR0hTQS02N2htLTI3bXgtOWNnN84AArgf
Link Following in Deno
Ecosystems: cargo
Packages: deno
Source: github
Published: almost 2 years ago
High
GSA_kwCzR0hTQS02cTR3LTl4NTYtcm13cc4AA5zQ
Deno arbitrary file descriptor close via `op_node_ipc_pipe()` leading to permission prompt bypass
Ecosystems: cargo
Packages: deno
Source: github
Published: 2 months ago
High
GSA_kwCzR0hTQS0yM3J4LWMzZzUtaHY5d84AA73I
Deno permission escalation vulnerability via open of privileged files with missing `--deny` flag
Ecosystems: cargo
Packages: deno
Source: github
Published: 6 days ago
High
GSA_kwCzR0hTQS13cnF2LXBmNmotbXFqcM4AA5xo
Deno's Node.js Compatibility Runtime has Cross-Session Data Contamination
Ecosystems: cargo
Packages: deno
Source: github
Published: 2 months ago
High
GSA_kwCzR0hTQS12YzUyLWd3bTMtOHYyZs4AAzkS
Missing "--allow-net" permission check for built-in Node modules
Ecosystems: cargo
Packages: deno_runtime, deno
Source: github
Published: 12 months ago
Moderate
GSA_kwCzR0hTQS1qYzk3LWgzaDktN3hoNs4AAygy
Regular Expression Denial of Service in Deno.upgradeWebSocket API
Ecosystems: cargo
Packages: deno
Source: github
Published: about 1 year ago
High
GSA_kwCzR0hTQS12cTY3LXJwOTMtNjVxZs4AAyUO
Interactive `run` permission prompt spoofing via improper ANSI neutralization
Ecosystems: cargo
Packages: deno, deno_runtime
Source: github
Published: about 1 year ago
Critical
GSA_kwCzR0hTQS04MzhoLWpxcDYtY2YyZs02gA
Sandbox bypass leading to arbitrary code execution in Deno
Ecosystems: cargo
Packages: deno
Source: github
Published: about 2 years ago
Moderate
GSA_kwCzR0hTQS1ocnFyLWp2OHctdjlqaM4AA5xa
Insufficient permission checking in `Deno.makeTemp*` APIs
Ecosystems: cargo
Packages: deno
Source: github
Published: 2 months ago
High
GSA_kwCzR0hTQS1tYzUyLWpwbTItY3FoNs4AAxFx
Deno is vulnerable to race condition via interactive permission prompt spoofing
Ecosystems: cargo
Packages: deno
Source: github
Published: over 1 year ago
High
GSA_kwCzR0hTQS14cjl3LXg2Z3ctYzltas4AAxz0
Duplicate advisory: Deno vulnerable to Regular Expression Denial of Service
Ecosystems: cargo
Packages: deno
Source: github
Published: about 1 year ago
Withdrawn: about 1 year ago