We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Description
Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code.
References GHSA-67hx-6x53-jw92 https://nvd.nist.gov/vuln/detail/CVE-2023-45133 babel/babel#16033 babel/babel@b13376b https://github.com/babel/babel/releases/tag/v7.23.2 https://github.com/babel/babel/releases/tag/v8.0.0-alpha.4 https://www.debian.org/security/2023/dsa-5528 https://lists.debian.org/debian-lts-announce/2023/10/msg00026.html https://babeljs.io/blog/2023/10/16/cve-2023-45133
The text was updated successfully, but these errors were encountered:
[SECURITY] Update @babel/traverse to version 7.23.3
9154dc6
Resolves: #20 Signed-off-by: Tobias Stahn <hello@tstahn.io>
Successfully merging a pull request may close this issue.
Description
Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code.
References
GHSA-67hx-6x53-jw92
https://nvd.nist.gov/vuln/detail/CVE-2023-45133
babel/babel#16033
babel/babel@b13376b
https://github.com/babel/babel/releases/tag/v7.23.2
https://github.com/babel/babel/releases/tag/v8.0.0-alpha.4
https://www.debian.org/security/2023/dsa-5528
https://lists.debian.org/debian-lts-announce/2023/10/msg00026.html
https://babeljs.io/blog/2023/10/16/cve-2023-45133
The text was updated successfully, but these errors were encountered: