Executive Summary
No expansive public description is actively mapped to this vulnerability payload yet.
Quantitative Risk Analysis
Attack Vector Profile
The payload vectors broken down by magnitude impact and ease-of-deployment factor mapping.
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HWhat This Means For Your System
Each point below is derived directly from this CVE's CVSS v3.1 vector — not editorial opinion.
Requires local system access; remote exploitation is not possible.
No special preconditions — the attack is reliably repeatable.
No authentication required — unauthenticated attackers can exploit directly.
No user interaction required — the attacker acts autonomously.
Successful exploitation causes: total service availability loss.
Remediation Commands
Commands to update each affected package identified in this advisory. Verify the target release explicitly addresses this CVE in the upstream changelog before deploying to production.
npm install @babel/helpers@latestnpm install @babel/runtime@latestnpm install @babel/runtime-corejs2@latestnpm install @babel/runtime-corejs3@latestnpm install @babel/helpers@latestnpm install @babel/runtime@latest