MAL-2023-1410

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/spammingsynonym/MAL-2023-1410.json
JSON Data
https://api.test.osv.dev/v1/vulns/MAL-2023-1410
Published
2023-05-10T13:10:33Z
Modified
2023-05-10T13:10:33Z
Summary
Malicious code in spammingsynonym (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: ossf-package-analysis (97a0609c600ca9bc940340f2595fb41607b5af5c3931f10350bea6aa3c9879ae)

The OpenSSF Package Analysis project identified 'spammingsynonym' @ 3.0.1 (pypi) as malicious.

It is considered malicious because: - The package communicates with a domain associated with malicious activity.

Database specific
{
    "malicious-packages-origins": [
        {
            "modified_time": "2023-05-10T13:10:33.11169217Z",
            "import_time": "2023-08-10T06:17:00.699158472Z",
            "versions": [
                "3.0.1"
            ],
            "source": "ossf-package-analysis",
            "sha256": "97a0609c600ca9bc940340f2595fb41607b5af5c3931f10350bea6aa3c9879ae"
        }
    ]
}
References
Credits

Affected packages

PyPI / spammingsynonym

Package

Affected ranges

Affected versions

3.*

3.0.1