We found results for “”
MSC-2024-10820
Date: July 4, 2024
A malicious Polyfill reference has been identified in this package. The issue is located in the file "package\examples\browser\pretty_printing_with_mathjax.html". To address this security concern, we recommend taking one of three actions: upgrade the package version to 10.5.3, where the reference was removed, or either remove the affected file completely or replace the suspicious reference with a trusted alternative. Reliable Polyfill sources include Cloudflare (https://cdnjs.cloudflare.com/polyfill) and Fastly (https://community.fastly.com/t/new-options-for-polyfill-io-users/2540).
Language: JS
Severity Score
Severity Score
Weakness Type (CWE)
Trojan Horse
CWE-507CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | HIGH |
Availability (A): | HIGH |