{"id":"MAL-2024-2564","summary":"Malicious code in jqplot-custom (npm)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n","modified":"2024-10-24T01:01:56Z","published":"2024-06-25T12:47:57Z","database_specific":{"malicious-packages-origins":[{"source":"reversing-labs","sha256":"5aa3ea91bebc85b7124f0fb27be98852ed851879ef1a1b17f74fcd7a1d41d38b","id":"RLMA-2024-01243","versions":["1.0.0"],"modified_time":"2024-06-25T12:47:57Z","import_time":"2024-06-28T02:43:42.869339659Z"},{"source":"reversing-labs","sha256":"f237922b86a4ae5d05386c096cff9b6bf9a1534b6733310ab3a9d2bd6b0d5dc7","id":"RLUA-2024-06772","modified_time":"2024-10-16T12:59:55Z","import_time":"2024-10-24T00:57:59.403244491Z"}]},"references":[{"type":"ADVISORY","url":"https://research.jfrog.com/malicious-packages/"}],"affected":[{"package":{"name":"jqplot-custom","ecosystem":"npm","purl":"pkg:npm/jqplot-custom"},"versions":["1.0.0"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/npm/jqplot-custom/MAL-2024-2564.json"}}],"schema_version":"1.7.3","credits":[{"name":"ReversingLabs","contact":["https://www.reversinglabs.com"],"type":"FINDER"}]}