We found results for “”
MSC-2023-16387
Date: September 14, 2023
This package has been identified by Mend as containing potential malicious functionality. The severity of the functionality can change depending on where the library is running (user's machine or backend server). The following risks were identified: Malicious obfuscated code – the code is intentionally difficult to understand or reverse-engineer. Attackers often use this to conceal their intentions. Contacting external host – this package sends requests/data to an external host that differs from the declared functionality. Suspect publisher – this publisher has a history of delivering packages previously flagged as malicious.
Language: JS
Severity Score
Severity Score
Weakness Type (CWE)
Hidden Functionality
CWE-912CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | LOW |
Integrity (I): | LOW |
Availability (A): | HIGH |