MAL-2024-6757

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/rubygems/batch-it/MAL-2024-6757.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2024-6757
Published
2024-06-25T13:49:34Z
Modified
2024-10-24T01:02:00Z
Summary
Malicious code in batch-it (RubyGems)
Details

-= Per source details. Do not edit below this line.=-

Database specific
{
    "malicious-packages-origins": [
        {
            "sha256": "f94bda6ca2fa362300c29d7a0277cdef72cc431fa6dda7b764befff2a858a0ca",
            "import_time": "2024-06-28T02:52:15.479192738Z",
            "versions": [
                "0.1.0"
            ],
            "id": "RLMA-2024-05563",
            "source": "reversing-labs",
            "modified_time": "2024-06-25T13:49:34Z"
        },
        {
            "sha256": "9f2515b14d3ebfd7f1f8f7de11fed88c61c0d2d884faecb1d027f3fc40fb24c8",
            "import_time": "2024-10-24T01:01:05.344153463Z",
            "id": "RLUA-2024-10082",
            "source": "reversing-labs",
            "modified_time": "2024-10-16T15:01:25Z"
        }
    ]
}
References
Credits

Affected packages

RubyGems / batch-it

Package

Name
batch-it
Purl
pkg:gem/batch-it

Affected ranges

Affected versions

0.*

0.1.0