MAL-2023-1432

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/rubygems/ptrsec_rce/MAL-2023-1432.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2023-1432
Published
2023-06-17T22:50:22Z
Modified
2023-06-17T22:50:22Z
Summary
Malicious code in ptrsec_rce (RubyGems)
Details

-= Per source details. Do not edit below this line.=-

Source: ossf-package-analysis (5c5f0c378deb022411d3a83e2b929f8ef8f9ad8e8eedd366e0863b7eb25d8aea)

The OpenSSF Package Analysis project identified 'ptrsec_rce' @ 0.0.1 (rubygems) as malicious.

It is considered malicious because: - The package communicates with a domain associated with malicious activity.

Database specific
{
    "malicious-packages-origins": [
        {
            "modified_time": "2023-06-17T22:50:22.734587612Z",
            "import_time": "2023-08-10T06:16:14.478038847Z",
            "versions": [
                "0.0.1"
            ],
            "source": "ossf-package-analysis",
            "sha256": "5c5f0c378deb022411d3a83e2b929f8ef8f9ad8e8eedd366e0863b7eb25d8aea"
        }
    ]
}
References
Credits

Affected packages

RubyGems / ptrsec_rce

Package

Name
ptrsec_rce
Purl
pkg:gem/ptrsec_rce

Affected ranges

Affected versions

0.*

0.0.1