{"id":"MAL-2024-4877","summary":"Malicious code in capmosterclouclient (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n","aliases":["SNYK-PYTHON-CAPMOSTERCLOUCLIENT-6513461"],"modified":"2024-10-24T01:01:58Z","published":"2024-06-25T13:33:17Z","database_specific":{"malicious-packages-origins":[{"source":"reversing-labs","sha256":"feab800b620638763b2ac617062851e966bfb257227e693685f06cb22e6276fa","import_time":"2024-06-28T02:48:28.423839258Z","versions":["1.0.0"],"modified_time":"2024-06-25T13:33:17Z","id":"RLMA-2024-03657"},{"source":"reversing-labs","sha256":"81ed5bd211ee90d76a6223fa5fe03a5dff36e50471d3ff94821eb212e21cbc3c","import_time":"2024-10-24T00:58:53.921680323Z","modified_time":"2024-10-16T14:37:42Z","id":"RLUA-2024-07945"}]},"references":[{"type":"ADVISORY","url":"https://security.snyk.io/vuln/SNYK-PYTHON-CAPMOSTERCLOUCLIENT-6513461"},{"type":"ARTICLE","url":"https://medium.com/checkmarx-security/pypi-is-under-attack-project-creation-and-user-registration-suspended-heres-the-details-c3b6291d4579"}],"affected":[{"package":{"name":"capmosterclouclient","ecosystem":"PyPI","purl":"pkg:pypi/capmosterclouclient"},"versions":["1.0.0"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/capmosterclouclient/MAL-2024-4877.json"}}],"schema_version":"1.7.3","credits":[{"name":"ReversingLabs","contact":["https://www.reversinglabs.com"],"type":"FINDER"}]}