We found results for “”
MSC-2023-16569
Date: September 20, 2023
This package has been identified by Mend as containing potential malicious functionality. The severity of the functionality can change depending on where the library is running (user's machine or backend server). The following risks were identified: Contacting external host – this package sends requests/data to an external host that differs from the declared functionality. Remote reverse shell – this package enables access to an attacker via a remote connection, allowing them to control the system remotely. Suspect publisher – this publisher has a history of delivering packages previously flagged as malicious.
Language: JS
Severity Score
Severity Score
Weakness Type (CWE)
Embedded Malicious Code
CWE-506CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | HIGH |
Availability (A): | HIGH |