{"id":"MAL-2024-9958","summary":"Malicious code in calendar-extender (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n","modified":"2024-10-16T14:37:20Z","published":"2024-10-16T14:37:20Z","database_specific":{"malicious-packages-origins":[{"source":"reversing-labs","sha256":"a20b47c9024cbf52a18f093e8e4c74c2c234599439fa0941c16ed24a5a347294","modified_time":"2024-10-16T14:37:20Z","versions":["0.1","0.2"],"id":"RLMA-2024-07911","import_time":"2024-10-24T00:56:54.615936263Z"}]},"references":[{"type":"ARTICLE","url":"https://securitylabs.datadoghq.com/articles/malicious-pypi-package-targeting-highly-specific-macos-machines"}],"affected":[{"package":{"name":"calendar-extender","ecosystem":"PyPI","purl":"pkg:pypi/calendar-extender"},"versions":["0.1","0.2"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/calendar-extender/MAL-2024-9958.json"}}],"schema_version":"1.7.3","credits":[{"name":"ReversingLabs","contact":["https://www.reversinglabs.com"],"type":"FINDER"}]}