GHSA-g3j5-mpp2-2fqm

Suggest an improvement
Source
https://github.com/advisories/GHSA-g3j5-mpp2-2fqm
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/01/GHSA-g3j5-mpp2-2fqm/GHSA-g3j5-mpp2-2fqm.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-g3j5-mpp2-2fqm
Published
2023-01-26T19:53:11Z
Modified
2023-01-26T19:53:12Z
Summary
symfont/process typosquatting malware spoofs symfony/process
Details

In September 2021, security researchers discovered a malicious Composer package called symfont/process, a typosquat targeting users of symfony/process. The malicious package has since been removed from Packagist.

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2023-01-26T19:53:11Z"
}
References

Affected packages

Packagist / symfont/process

Package

Name
symfont/process
Purl
pkg:composer/symfont/process

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected