{"id":"MAL-2024-2571","summary":"Malicious code in jqueryoffline (npm)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n","modified":"2024-10-24T01:01:56Z","published":"2024-06-25T12:48:08Z","database_specific":{"malicious-packages-origins":[{"modified_time":"2024-06-25T12:48:08Z","sha256":"9aa2af5eb106d604b9370006abfcd02b04d5925720e7a839826c6f8b9652c1aa","id":"RLMA-2024-01250","source":"reversing-labs","import_time":"2024-06-28T02:43:43.755173747Z","versions":["1.0.2"]},{"modified_time":"2024-10-16T13:00:09Z","sha256":"f708f02a5b4fa14d71f491ba4913662e820ccd8a33a7a37c1890d115959bfb28","id":"RLUA-2024-06780","import_time":"2024-10-24T00:57:59.876778315Z","source":"reversing-labs"}]},"references":[{"type":"ARTICLE","url":"https://www.reversinglabs.com/blog/operation-brainleeches-malicious-npm-packages-fuel-supply-chain-and-phishing-attacks"}],"affected":[{"package":{"name":"jqueryoffline","ecosystem":"npm","purl":"pkg:npm/jqueryoffline"},"versions":["1.0.2"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/npm/jqueryoffline/MAL-2024-2571.json"}}],"schema_version":"1.7.3","credits":[{"name":"ReversingLabs","contact":["https://www.reversinglabs.com"],"type":"FINDER"}]}