关键漏洞信息 漏洞类型: Stack use-after-free in deno Priority: P1 Severity: S1 Status: Fixed Reporter: ch...@gmail.com Version: Deno version 1.9.0 Operating System: all Reproduction Steps: 1. Run Deno with the following command: deno run --allow-read=http://localhost:8000/poc.js 2. Trigger the stack use-after-free vulnerability which can be exploited to achieve Remote Code Execution (RCE). Stack Trace: Assignee: ma...@deno.org Assignee Verifier: Collaborators: - ad...@deno.org - am...@deno.org - ba...@deno.org Labels: - bug - security - severity-S1 - priority-P1 - fixed-1.12 ``` 注意:上述信息是基于前面场景的信息进行的演绎,尤其是对于“Reproduction Steps”和“Stack Trace”的描述,以适应另一个关于 "deno" 的场景。在实际情况下,应根据具体情况调整。