Skip to content

Commit cf0cdc3

Browse files
author
github-actions
committed
Assign IDs
1 parent 08c6c3e commit cf0cdc3

File tree

4 files changed

+15
-15
lines changed

4 files changed

+15
-15
lines changed

osv/malicious/.id-allocator

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
7d206a06271539b5cfa9cb57703a8d39b82f3312282fb7ad30a445e6439a83f0
1+
bdc5e9b5610d87f4272a6dbc6a130981aa1a3d4bf8cfe89c8729455d76794299
Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,9 @@
22
"modified": "2025-12-06T17:35:39Z",
33
"published": "2025-12-06T17:35:39Z",
44
"schema_version": "1.7.4",
5-
"id": "",
5+
"id": "MAL-2025-192361",
66
"summary": "Malicious code in datadog-checks-base (npm)",
7-
"details": "The OpenSSF Package Analysis project identified 'datadog-checks-base' @ 50.0.0 (npm) as malicious.\n\nIt is considered malicious because:\n\n- The package communicates with a domain associated with malicious activity.\n\n- The package executes one or more commands associated with malicious behavior.\n",
7+
"details": "\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: ossf-package-analysis (c0928a2f92beacda32023ac378b5df81feeffd91699903ea3500b46a6fcdefb9)\nThe OpenSSF Package Analysis project identified 'datadog-checks-base' @ 50.0.0 (npm) as malicious.\n\nIt is considered malicious because:\n\n- The package communicates with a domain associated with malicious activity.\n\n- The package executes one or more commands associated with malicious behavior.\n",
88
"affected": [
99
{
1010
"package": {
@@ -29,10 +29,10 @@
2929
"database_specific": {
3030
"malicious-packages-origins": [
3131
{
32-
"source": "ossf-package-analysis",
33-
"sha256": "c0928a2f92beacda32023ac378b5df81feeffd91699903ea3500b46a6fcdefb9",
3432
"import_time": "2025-12-06T17:35:49.839682673Z",
3533
"modified_time": "2025-12-06T17:35:39Z",
34+
"sha256": "c0928a2f92beacda32023ac378b5df81feeffd91699903ea3500b46a6fcdefb9",
35+
"source": "ossf-package-analysis",
3636
"versions": [
3737
"50.0.0"
3838
]

osv/malicious/pypi/evil-rce2/MAL-0000-kam193-63a6a4d1f5ad55b3.json renamed to osv/malicious/pypi/evil-rce2/MAL-2025-192362.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,9 @@
22
"modified": "2025-12-06T16:25:44Z",
33
"published": "2025-12-06T16:25:44Z",
44
"schema_version": "1.7.4",
5-
"id": "",
5+
"id": "MAL-2025-192362",
66
"summary": "Malicious code in evil-rce2 (PyPI)",
7-
"details": "Running the module starts a reverse shell\n\n\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: 2025-12-evil-rce\n\n\nReasons (based on the campaign):\n\n\n - The package contains code to create a reverse shell, allowing an attacker to execute any commands on the victim's machine.\n\n",
7+
"details": "\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (63a6a4d1f5ad55b3b2b836b95a7153f322bb4ea2f718f665a51a4a94f32576d5)\nRunning the module starts a reverse shell\n\n\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: 2025-12-evil-rce\n\n\nReasons (based on the campaign):\n\n\n - The package contains code to create a reverse shell, allowing an attacker to execute any commands on the victim's machine.\n",
88
"affected": [
99
{
1010
"package": {
@@ -35,11 +35,11 @@
3535
"database_specific": {
3636
"malicious-packages-origins": [
3737
{
38-
"source": "kam193",
39-
"sha256": "63a6a4d1f5ad55b3b2b836b95a7153f322bb4ea2f718f665a51a4a94f32576d5",
40-
"import_time": "2025-12-06T17:36:04.133462425Z",
4138
"id": "pypi/2025-12-evil-rce/evil-rce2",
39+
"import_time": "2025-12-06T17:36:04.133462425Z",
4240
"modified_time": "2025-12-06T16:25:44.549237Z",
41+
"sha256": "63a6a4d1f5ad55b3b2b836b95a7153f322bb4ea2f718f665a51a4a94f32576d5",
42+
"source": "kam193",
4343
"versions": [
4444
"1.0.0"
4545
]

osv/malicious/pypi/telco/MAL-0000-kam193-55c8199592663c3f.json renamed to osv/malicious/pypi/telco/MAL-2025-192363.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,9 @@
22
"modified": "2025-12-06T16:24:38Z",
33
"published": "2025-12-06T16:24:38Z",
44
"schema_version": "1.7.4",
5-
"id": "",
5+
"id": "MAL-2025-192363",
66
"summary": "Malicious code in telco (PyPI)",
7-
"details": "Running the module starts a reverse shell\n\n\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: 2025-12-evil-rce\n\n\nReasons (based on the campaign):\n\n\n - The package contains code to create a reverse shell, allowing an attacker to execute any commands on the victim's machine.\n\n",
7+
"details": "\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (55c8199592663c3f388cba22988800084bbc3a5696279eb22c53e837c1d8ac40)\nRunning the module starts a reverse shell\n\n\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: 2025-12-evil-rce\n\n\nReasons (based on the campaign):\n\n\n - The package contains code to create a reverse shell, allowing an attacker to execute any commands on the victim's machine.\n",
88
"affected": [
99
{
1010
"package": {
@@ -35,11 +35,11 @@
3535
"database_specific": {
3636
"malicious-packages-origins": [
3737
{
38-
"source": "kam193",
39-
"sha256": "55c8199592663c3f388cba22988800084bbc3a5696279eb22c53e837c1d8ac40",
40-
"import_time": "2025-12-06T17:36:04.135980629Z",
4138
"id": "pypi/2025-12-evil-rce/telco",
39+
"import_time": "2025-12-06T17:36:04.135980629Z",
4240
"modified_time": "2025-12-06T16:24:38.836736Z",
41+
"sha256": "55c8199592663c3f388cba22988800084bbc3a5696279eb22c53e837c1d8ac40",
42+
"source": "kam193",
4343
"versions": [
4444
"1.0.1"
4545
]

0 commit comments

Comments
 (0)