We found results for “”
MSC-2024-16356
Good to know:
Date: November 13, 2024
This package has been identified by Mend as containing potential malicious functionality. The severity of the functionality can change depending on where the library is running (user's machine or backend server). The following risks were identified: Suspect publisher – this publisher has a history of delivering packages previously flagged as malicious. Please remove the compromised package from your project and replace it with a secure alternative. Contacting external host – this package sends requests/data to an external host that differs from the declared functionality. Please remove the compromised package from your project and replace it with a secure alternative. Exfiltrating sensitive user system data – unauthorized access to sensitive system information. Please remove the compromised package from your project and replace it with a secure alternative.
Language: JS
Severity Score
Severity Score
Weakness Type (CWE)
Embedded Malicious Code
CWE-506CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | LOW |
Integrity (I): | LOW |
Availability (A): | HIGH |