We found results for “”
MSC-2024-2671
Date: May 28, 2024
This package has been identified by Mend as containing potential malicious functionality. The severity of the functionality can change depending on where the library is running (user's machine or backend server). The following risks were identified: Exfiltrating sensitive private user information – unauthorized access to sensitive system information, such as browser data, application tokens, etc.
Language: Python
Severity Score
Severity Score
Weakness Type (CWE)
Information Leak / Disclosure
CWE-200CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | LOW |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | LOW |
Integrity (I): | LOW |
Availability (A): | LOW |