MAL-2024-1333

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/threadxpools/MAL-2024-1333.json
JSON Data
https://api.test.osv.dev/v1/vulns/MAL-2024-1333
Published
2024-05-05T19:10:54Z
Modified
2024-05-06T02:38:12Z
Summary
Malicious code in threadxpools (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: ossf-package-analysis (41a0be6e9aa8db3965bae9f646d47ad6cb85ac9600c8bd71358409062b8fe105)

The OpenSSF Package Analysis project identified 'threadxpools' @ 1.2 (pypi) as malicious.

It is considered malicious because:

  • The package communicates with a domain associated with malicious activity.
Database specific
{
    "malicious-packages-origins": [
        {
            "modified_time": "2024-05-05T19:17:29Z",
            "import_time": "2024-05-06T02:37:56.710209536Z",
            "versions": [
                "1.2"
            ],
            "source": "ossf-package-analysis",
            "sha256": "41a0be6e9aa8db3965bae9f646d47ad6cb85ac9600c8bd71358409062b8fe105"
        },
        {
            "modified_time": "2024-05-05T19:10:54Z",
            "import_time": "2024-05-06T02:37:56.622833878Z",
            "versions": [
                "1.0"
            ],
            "source": "ossf-package-analysis",
            "sha256": "d1017e118ad5a001211a639263fb872dfa5dde20fcd41e1674155a2d7977fb47"
        }
    ]
}
References
Credits

Affected packages

PyPI / threadxpools

Package

Affected ranges

Affected versions

1.*

1.0
1.2