muaddib-scanner 1.0.6 → 1.0.8

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/data/iocs.json CHANGED
@@ -1,38 +1,2163 @@
1
- {
2
- "version": "1.1.0",
3
- "updated": "2026-01-01",
4
- "description": "IOCs communautaires MUAD'DIB - Contribuez via PR",
5
- "packages": [
6
- { "name": "ua-parser-js", "version": "0.7.29", "source": "community", "description": "Compromis octobre 2021 - crypto miner" },
7
- { "name": "coa", "version": "2.0.3", "source": "community", "description": "Compromis novembre 2021" },
8
- { "name": "coa", "version": "2.0.4", "source": "community", "description": "Compromis novembre 2021" },
9
- { "name": "rc", "version": "1.2.9", "source": "community", "description": "Compromis novembre 2021" },
10
- { "name": "rc", "version": "1.3.9", "source": "community", "description": "Compromis novembre 2021" },
11
- { "name": "left-pad", "version": "*", "source": "community", "description": "Incident 2016 - supply chain" },
12
- { "name": "lodash-merge", "version": "*", "source": "typosquat", "description": "Typosquat de lodash.merge" },
13
- { "name": "loadash", "version": "*", "source": "typosquat", "description": "Typosquat de lodash" },
14
- { "name": "electorn", "version": "*", "source": "typosquat", "description": "Typosquat de electron" },
15
- { "name": "discord.js-selfbot-v11", "version": "*", "source": "community", "description": "Token stealer Discord" },
16
- { "name": "discord-selfbot-tools", "version": "*", "source": "community", "description": "Token stealer Discord" },
17
- { "name": "discordsystem", "version": "*", "source": "community", "description": "Token stealer Discord" },
18
- { "name": "discord-lofy", "version": "*", "source": "community", "description": "Token stealer Discord" },
19
- { "name": "prerequests", "version": "*", "source": "typosquat", "description": "Typosquat de prerequests" },
20
- { "name": "requstes", "version": "*", "source": "typosquat", "description": "Typosquat de requests" }
21
- ],
22
- "hashes": [
23
- "8f3c4e2a1b5d6c7e9f0a1b2c3d4e5f6a7b8c9d0e1f2a3b4c5d6e7f8a9b0c1d2e",
24
- "1a2b3c4d5e6f7a8b9c0d1e2f3a4b5c6d7e8f9a0b1c2d3e4f5a6b7c8d9e0f1a2b"
25
- ],
26
- "files": [
27
- "discord-webhook.js",
28
- "token-grabber.js",
29
- "stealer.js",
30
- "inject.js"
31
- ],
32
- "markers": [
33
- "discord.com/api/webhooks",
34
- "token grabber",
35
- "crypto miner",
36
- "xmrig"
37
- ]
1
+ {
2
+ "version": "1.1.0",
3
+ "updated": "2026-01-01",
4
+ "description": "IOCs communautaires MUAD'DIB - Contribuez via PR",
5
+ "packages": [
6
+ {
7
+ "name": "ua-parser-js",
8
+ "version": "0.7.29",
9
+ "source": "community",
10
+ "description": "Compromis octobre 2021 - crypto miner"
11
+ },
12
+ {
13
+ "name": "coa",
14
+ "version": "2.0.3",
15
+ "source": "community",
16
+ "description": "Compromis novembre 2021"
17
+ },
18
+ {
19
+ "name": "coa",
20
+ "version": "2.0.4",
21
+ "source": "community",
22
+ "description": "Compromis novembre 2021"
23
+ },
24
+ {
25
+ "name": "rc",
26
+ "version": "1.2.9",
27
+ "source": "community",
28
+ "description": "Compromis novembre 2021"
29
+ },
30
+ {
31
+ "name": "rc",
32
+ "version": "1.3.9",
33
+ "source": "community",
34
+ "description": "Compromis novembre 2021"
35
+ },
36
+ {
37
+ "name": "left-pad",
38
+ "version": "*",
39
+ "source": "community",
40
+ "description": "Incident 2016 - supply chain"
41
+ },
42
+ {
43
+ "name": "lodash-merge",
44
+ "version": "*",
45
+ "source": "typosquat",
46
+ "description": "Typosquat de lodash.merge"
47
+ },
48
+ {
49
+ "name": "loadash",
50
+ "version": "*",
51
+ "source": "typosquat",
52
+ "description": "Typosquat de lodash"
53
+ },
54
+ {
55
+ "name": "electorn",
56
+ "version": "*",
57
+ "source": "typosquat",
58
+ "description": "Typosquat de electron"
59
+ },
60
+ {
61
+ "name": "discord.js-selfbot-v11",
62
+ "version": "*",
63
+ "source": "community",
64
+ "description": "Token stealer Discord"
65
+ },
66
+ {
67
+ "name": "discord-selfbot-tools",
68
+ "version": "*",
69
+ "source": "community",
70
+ "description": "Token stealer Discord"
71
+ },
72
+ {
73
+ "name": "discordsystem",
74
+ "version": "*",
75
+ "source": "community",
76
+ "description": "Token stealer Discord"
77
+ },
78
+ {
79
+ "name": "discord-lofy",
80
+ "version": "*",
81
+ "source": "community",
82
+ "description": "Token stealer Discord"
83
+ },
84
+ {
85
+ "name": "prerequests",
86
+ "version": "*",
87
+ "source": "typosquat",
88
+ "description": "Typosquat de prerequests"
89
+ },
90
+ {
91
+ "name": "requstes",
92
+ "version": "*",
93
+ "source": "typosquat",
94
+ "description": "Typosquat de requests"
95
+ },
96
+ {
97
+ "id": "GHSA-GHSA-rwc2-f344-q6w6",
98
+ "name": "serverless",
99
+ "version": ">= 4.29.0, < 4.29.3",
100
+ "severity": "high",
101
+ "confidence": "high",
102
+ "source": "github-advisory",
103
+ "description": "serverless MCP Server vulnerable to Command Injection in list-projects tool",
104
+ "references": [
105
+ "https://github.com/advisories/GHSA-rwc2-f344-q6w6"
106
+ ],
107
+ "mitre": "T1195.002",
108
+ "cve": "CVE-2025-69256"
109
+ },
110
+ {
111
+ "id": "GHSA-GHSA-6rw7-vpxm-498p",
112
+ "name": "qs",
113
+ "version": "< 6.14.1",
114
+ "severity": "high",
115
+ "confidence": "high",
116
+ "source": "github-advisory",
117
+ "description": "qs's arrayLimit bypass in its bracket notation allows DoS via memory exhaustion",
118
+ "references": [
119
+ "https://github.com/advisories/GHSA-6rw7-vpxm-498p"
120
+ ],
121
+ "mitre": "T1195.002",
122
+ "cve": "CVE-2025-15284"
123
+ },
124
+ {
125
+ "id": "GHSA-GHSA-xphh-5v4r-r3rx",
126
+ "name": "psitransfer",
127
+ "version": "< 2.3.1",
128
+ "severity": "high",
129
+ "confidence": "high",
130
+ "source": "github-advisory",
131
+ "description": "PsiTransfer has Zip Slip Path Traversal via TAR Archive Download",
132
+ "references": [
133
+ "https://github.com/advisories/GHSA-xphh-5v4r-r3rx"
134
+ ],
135
+ "mitre": "T1195.002",
136
+ "cve": null
137
+ },
138
+ {
139
+ "id": "GHSA-GHSA-6vj3-p34w-xxjp",
140
+ "name": "apidoc-core",
141
+ "version": ">= 0.2.0, <= 0.15.0",
142
+ "severity": "critical",
143
+ "confidence": "high",
144
+ "source": "github-advisory",
145
+ "description": "apidoc-core has a prototype pollution vulnerability",
146
+ "references": [
147
+ "https://github.com/advisories/GHSA-6vj3-p34w-xxjp"
148
+ ],
149
+ "mitre": "T1195.002",
150
+ "cve": "CVE-2025-13158"
151
+ },
152
+ {
153
+ "id": "GHSA-GHSA-j4p8-h8mh-rh8q",
154
+ "name": "n8n",
155
+ "version": ">= 1.2.1, < 2.0.0",
156
+ "severity": "high",
157
+ "confidence": "high",
158
+ "source": "github-advisory",
159
+ "description": "Self-hosted n8n has Legacy Code node that enables arbitrary file read/write",
160
+ "references": [
161
+ "https://github.com/advisories/GHSA-j4p8-h8mh-rh8q"
162
+ ],
163
+ "mitre": "T1195.002",
164
+ "cve": "CVE-2025-68697"
165
+ },
166
+ {
167
+ "id": "GHSA-GHSA-jv72-59wq-8rxm",
168
+ "name": "libxmljs",
169
+ "version": "<= 1.0.11",
170
+ "severity": "high",
171
+ "confidence": "high",
172
+ "source": "github-advisory",
173
+ "description": "libxmljs has segmentation fault, potentially leading to a denial-of-service (DoS)",
174
+ "references": [
175
+ "https://github.com/advisories/GHSA-jv72-59wq-8rxm"
176
+ ],
177
+ "mitre": "T1195.002",
178
+ "cve": "CVE-2025-25341"
179
+ },
180
+ {
181
+ "id": "GHSA-GHSA-r399-636x-v7f6",
182
+ "name": "@langchain/core",
183
+ "version": ">= 1.0.0, < 1.1.8",
184
+ "severity": "high",
185
+ "confidence": "high",
186
+ "source": "github-advisory",
187
+ "description": "LangChain serialization injection vulnerability enables secret extraction",
188
+ "references": [
189
+ "https://github.com/advisories/GHSA-r399-636x-v7f6"
190
+ ],
191
+ "mitre": "T1195.002",
192
+ "cve": "CVE-2025-68665"
193
+ },
194
+ {
195
+ "id": "GHSA-GHSA-r399-636x-v7f6",
196
+ "name": "langchain",
197
+ "version": ">= 1.0.0, < 1.2.3",
198
+ "severity": "high",
199
+ "confidence": "high",
200
+ "source": "github-advisory",
201
+ "description": "LangChain serialization injection vulnerability enables secret extraction",
202
+ "references": [
203
+ "https://github.com/advisories/GHSA-r399-636x-v7f6"
204
+ ],
205
+ "mitre": "T1195.002",
206
+ "cve": "CVE-2025-68665"
207
+ },
208
+ {
209
+ "id": "GHSA-GHSA-rchf-xwx2-hm93",
210
+ "name": "@fedify/fedify",
211
+ "version": "< 1.6.13",
212
+ "severity": "high",
213
+ "confidence": "high",
214
+ "source": "github-advisory",
215
+ "description": "Fedify has ReDoS Vulnerability in HTML Parsing Regex",
216
+ "references": [
217
+ "https://github.com/advisories/GHSA-rchf-xwx2-hm93"
218
+ ],
219
+ "mitre": "T1195.002",
220
+ "cve": "CVE-2025-68475"
221
+ },
222
+ {
223
+ "id": "GHSA-GHSA-8452-54wp-rmv6",
224
+ "name": "storybook",
225
+ "version": ">= 7.0.0, < 7.6.21",
226
+ "severity": "high",
227
+ "confidence": "high",
228
+ "source": "github-advisory",
229
+ "description": "Storybook manager bundle may expose environment variables during build",
230
+ "references": [
231
+ "https://github.com/advisories/GHSA-8452-54wp-rmv6"
232
+ ],
233
+ "mitre": "T1195.002",
234
+ "cve": "CVE-2025-68429"
235
+ },
236
+ {
237
+ "id": "GHSA-GHSA-529f-9qwm-9628",
238
+ "name": "tinacms",
239
+ "version": "< 3.1.1",
240
+ "severity": "high",
241
+ "confidence": "high",
242
+ "source": "github-advisory",
243
+ "description": "tinacms is vulnerable to arbitrary code execution",
244
+ "references": [
245
+ "https://github.com/advisories/GHSA-529f-9qwm-9628"
246
+ ],
247
+ "mitre": "T1195.002",
248
+ "cve": "CVE-2025-68278"
249
+ },
250
+ {
251
+ "id": "GHSA-GHSA-529f-9qwm-9628",
252
+ "name": "@tinacms/cli",
253
+ "version": "< 2.0.4",
254
+ "severity": "high",
255
+ "confidence": "high",
256
+ "source": "github-advisory",
257
+ "description": "tinacms is vulnerable to arbitrary code execution",
258
+ "references": [
259
+ "https://github.com/advisories/GHSA-529f-9qwm-9628"
260
+ ],
261
+ "mitre": "T1195.002",
262
+ "cve": "CVE-2025-68278"
263
+ },
264
+ {
265
+ "id": "GHSA-GHSA-529f-9qwm-9628",
266
+ "name": "@tinacms/graphql",
267
+ "version": "< 2.0.3",
268
+ "severity": "high",
269
+ "confidence": "high",
270
+ "source": "github-advisory",
271
+ "description": "tinacms is vulnerable to arbitrary code execution",
272
+ "references": [
273
+ "https://github.com/advisories/GHSA-529f-9qwm-9628"
274
+ ],
275
+ "mitre": "T1195.002",
276
+ "cve": "CVE-2025-68278"
277
+ },
278
+ {
279
+ "id": "GHSA-GHSA-wphj-fx3q-84ch",
280
+ "name": "systeminformation",
281
+ "version": "< 5.27.14",
282
+ "severity": "high",
283
+ "confidence": "high",
284
+ "source": "github-advisory",
285
+ "description": "systeminformation has a Command Injection vulnerability in fsSize() function on Windows",
286
+ "references": [
287
+ "https://github.com/advisories/GHSA-wphj-fx3q-84ch"
288
+ ],
289
+ "mitre": "T1195.002",
290
+ "cve": "CVE-2025-68154"
291
+ },
292
+ {
293
+ "id": "GHSA-GHSA-3f5f-xgrj-97pf",
294
+ "name": "parse-server",
295
+ "version": ">= 9.0.0, < 9.1.1.alpha.1",
296
+ "severity": "high",
297
+ "confidence": "high",
298
+ "source": "github-advisory",
299
+ "description": "Parse Server is vulnerable to Server-Side Request Forgery (SSRF) via Instagram OAuth Adapter",
300
+ "references": [
301
+ "https://github.com/advisories/GHSA-3f5f-xgrj-97pf"
302
+ ],
303
+ "mitre": "T1195.002",
304
+ "cve": "CVE-2025-68150"
305
+ },
306
+ {
307
+ "id": "GHSA-GHSA-g239-q96q-x4qm",
308
+ "name": "@vitejs/plugin-rsc",
309
+ "version": "< 0.5.8",
310
+ "severity": "high",
311
+ "confidence": "high",
312
+ "source": "github-advisory",
313
+ "description": "@vitejs/plugin-rsc has an Arbitrary File Read via `/__vite_rsc_findSourceMapURL` Endpoint",
314
+ "references": [
315
+ "https://github.com/advisories/GHSA-g239-q96q-x4qm"
316
+ ],
317
+ "mitre": "T1195.002",
318
+ "cve": "CVE-2025-68155"
319
+ },
320
+ {
321
+ "id": "GHSA-GHSA-x732-6j76-qmhm",
322
+ "name": "better-auth",
323
+ "version": "< 1.4.5",
324
+ "severity": "high",
325
+ "confidence": "high",
326
+ "source": "github-advisory",
327
+ "description": "Better Auth's rou3 Dependency has Double-Slash Path Normalization which can Bypass disabledPaths Config and Rate Limits",
328
+ "references": [
329
+ "https://github.com/advisories/GHSA-x732-6j76-qmhm"
330
+ ],
331
+ "mitre": "T1195.002",
332
+ "cve": null
333
+ },
334
+ {
335
+ "id": "GHSA-GHSA-43p4-m455-4f4j",
336
+ "name": "@trpc/server",
337
+ "version": ">= 10.27.0, < 10.45.3",
338
+ "severity": "high",
339
+ "confidence": "high",
340
+ "source": "github-advisory",
341
+ "description": "tRPC has possible prototype pollution in `experimental_nextAppDirCaller`",
342
+ "references": [
343
+ "https://github.com/advisories/GHSA-43p4-m455-4f4j"
344
+ ],
345
+ "mitre": "T1195.002",
346
+ "cve": "CVE-2025-68130"
347
+ },
348
+ {
349
+ "id": "GHSA-GHSA-vr6p-vq2p-6j74",
350
+ "name": "likec4",
351
+ "version": "<= 1.46.1",
352
+ "severity": "critical",
353
+ "confidence": "high",
354
+ "source": "github-advisory",
355
+ "description": "Withdrawn Advisory: LikeC4 has RCE through vulnerable React and Next.js versions",
356
+ "references": [
357
+ "https://github.com/advisories/GHSA-vr6p-vq2p-6j74"
358
+ ],
359
+ "mitre": "T1195.002",
360
+ "cve": null
361
+ },
362
+ {
363
+ "id": "GHSA-GHSA-496g-mmpw-j9x3",
364
+ "name": "misskey-js",
365
+ "version": ">= 13.0.0-beta.16, < 2025.12.0",
366
+ "severity": "high",
367
+ "confidence": "high",
368
+ "source": "github-advisory",
369
+ "description": "misskey.js's export data contains private post data",
370
+ "references": [
371
+ "https://github.com/advisories/GHSA-496g-mmpw-j9x3"
372
+ ],
373
+ "mitre": "T1195.002",
374
+ "cve": "CVE-2025-66402"
375
+ },
376
+ {
377
+ "id": "GHSA-GHSA-3jp5-5f8r-q2wg",
378
+ "name": "vuetify",
379
+ "version": ">= 2.2.0-beta.2, < 3.0.0-alpha.10",
380
+ "severity": "high",
381
+ "confidence": "high",
382
+ "source": "github-advisory",
383
+ "description": "Vuetify has a Prototype Pollution vulnerability",
384
+ "references": [
385
+ "https://github.com/advisories/GHSA-3jp5-5f8r-q2wg"
386
+ ],
387
+ "mitre": "T1195.002",
388
+ "cve": "CVE-2025-8083"
389
+ },
390
+ {
391
+ "id": "GHSA-GHSA-55jh-84jv-8mx8",
392
+ "name": "lightning-flow-scanner",
393
+ "version": "< 6.10.6",
394
+ "severity": "high",
395
+ "confidence": "high",
396
+ "source": "github-advisory",
397
+ "description": "Lightning Flow Scanner Vulnerable to Code Injection via Unsafe Use of `new Function()` in APIVersion Rule",
398
+ "references": [
399
+ "https://github.com/advisories/GHSA-55jh-84jv-8mx8"
400
+ ],
401
+ "mitre": "T1195.002",
402
+ "cve": "CVE-2025-67750"
403
+ },
404
+ {
405
+ "id": "GHSA-GHSA-5j59-xgg2-r9c4",
406
+ "name": "next",
407
+ "version": ">= 13.3.1-canary.0, < 14.2.35",
408
+ "severity": "high",
409
+ "confidence": "high",
410
+ "source": "github-advisory",
411
+ "description": "Next has a Denial of Service with Server Components - Incomplete Fix Follow-Up",
412
+ "references": [
413
+ "https://github.com/advisories/GHSA-5j59-xgg2-r9c4"
414
+ ],
415
+ "mitre": "T1195.002",
416
+ "cve": null
417
+ },
418
+ {
419
+ "id": "GHSA-GHSA-7gmr-mq3h-m5h9",
420
+ "name": "react-server-dom-parcel",
421
+ "version": ">= 19.0.2, < 19.0.3",
422
+ "severity": "high",
423
+ "confidence": "high",
424
+ "source": "github-advisory",
425
+ "description": "Denial of Service Vulnerability in React Server Components",
426
+ "references": [
427
+ "https://github.com/advisories/GHSA-7gmr-mq3h-m5h9"
428
+ ],
429
+ "mitre": "T1195.002",
430
+ "cve": "CVE-2025-67779"
431
+ },
432
+ {
433
+ "id": "GHSA-GHSA-7gmr-mq3h-m5h9",
434
+ "name": "react-server-dom-turbopack",
435
+ "version": ">= 19.0.2, < 19.0.3",
436
+ "severity": "high",
437
+ "confidence": "high",
438
+ "source": "github-advisory",
439
+ "description": "Denial of Service Vulnerability in React Server Components",
440
+ "references": [
441
+ "https://github.com/advisories/GHSA-7gmr-mq3h-m5h9"
442
+ ],
443
+ "mitre": "T1195.002",
444
+ "cve": "CVE-2025-67779"
445
+ },
446
+ {
447
+ "id": "GHSA-GHSA-7gmr-mq3h-m5h9",
448
+ "name": "react-server-dom-webpack",
449
+ "version": ">= 19.0.2, < 19.0.3",
450
+ "severity": "high",
451
+ "confidence": "high",
452
+ "source": "github-advisory",
453
+ "description": "Denial of Service Vulnerability in React Server Components",
454
+ "references": [
455
+ "https://github.com/advisories/GHSA-7gmr-mq3h-m5h9"
456
+ ],
457
+ "mitre": "T1195.002",
458
+ "cve": "CVE-2025-67779"
459
+ },
460
+ {
461
+ "id": "GHSA-GHSA-qgc4-8p88-4w7m",
462
+ "name": "servify-express",
463
+ "version": "<= 1.1",
464
+ "severity": "high",
465
+ "confidence": "high",
466
+ "source": "github-advisory",
467
+ "description": "Servify-express rate limit issue",
468
+ "references": [
469
+ "https://github.com/advisories/GHSA-qgc4-8p88-4w7m"
470
+ ],
471
+ "mitre": "T1195.002",
472
+ "cve": "CVE-2025-67731"
473
+ },
474
+ {
475
+ "id": "GHSA-GHSA-m654-769v-qjv7",
476
+ "name": "formio",
477
+ "version": "< 3.5.7",
478
+ "severity": "high",
479
+ "confidence": "high",
480
+ "source": "github-advisory",
481
+ "description": "Formio improperly authorized permission elevation through specially crafted request path",
482
+ "references": [
483
+ "https://github.com/advisories/GHSA-m654-769v-qjv7"
484
+ ],
485
+ "mitre": "T1195.002",
486
+ "cve": "CVE-2025-67718"
487
+ },
488
+ {
489
+ "id": "GHSA-GHSA-8vch-m3f4-q8jf",
490
+ "name": "elysia",
491
+ "version": "< 1.4.18",
492
+ "severity": "high",
493
+ "confidence": "high",
494
+ "source": "github-advisory",
495
+ "description": "Elysia affected by arbitrary code injection through cookie config",
496
+ "references": [
497
+ "https://github.com/advisories/GHSA-8vch-m3f4-q8jf"
498
+ ],
499
+ "mitre": "T1195.002",
500
+ "cve": "CVE-2025-66457"
501
+ },
502
+ {
503
+ "id": "GHSA-GHSA-8wvc-869r-xfqf",
504
+ "name": "open-webui",
505
+ "version": "<= 0.6.36",
506
+ "severity": "high",
507
+ "confidence": "high",
508
+ "source": "github-advisory",
509
+ "description": "Open WebUI Vulnerable to Stored DOM XSS via Note 'Download PDF'",
510
+ "references": [
511
+ "https://github.com/advisories/GHSA-8wvc-869r-xfqf"
512
+ ],
513
+ "mitre": "T1195.002",
514
+ "cve": "CVE-2025-65959"
515
+ },
516
+ {
517
+ "id": "GHSA-GHSA-869p-cjfg-cm3x",
518
+ "name": "jws",
519
+ "version": "< 3.2.3",
520
+ "severity": "high",
521
+ "confidence": "high",
522
+ "source": "github-advisory",
523
+ "description": "auth0/node-jws Improperly Verifies HMAC Signature",
524
+ "references": [
525
+ "https://github.com/advisories/GHSA-869p-cjfg-cm3x"
526
+ ],
527
+ "mitre": "T1195.002",
528
+ "cve": "CVE-2025-65945"
529
+ },
530
+ {
531
+ "id": "GHSA-GHSA-xq4m-mc3c-vvg3",
532
+ "name": "@anthropic-ai/claude-code",
533
+ "version": "< 1.0.93",
534
+ "severity": "high",
535
+ "confidence": "high",
536
+ "source": "github-advisory",
537
+ "description": "Claude Code Command Validation Bypass Allows Arbitrary Code Execution",
538
+ "references": [
539
+ "https://github.com/advisories/GHSA-xq4m-mc3c-vvg3"
540
+ ],
541
+ "mitre": "T1195.002",
542
+ "cve": "CVE-2025-66032"
543
+ },
544
+ {
545
+ "id": "GHSA-GHSA-w48q-cv73-mx4w",
546
+ "name": "@modelcontextprotocol/sdk",
547
+ "version": "< 1.24.0",
548
+ "severity": "high",
549
+ "confidence": "high",
550
+ "source": "github-advisory",
551
+ "description": "Model Context Protocol (MCP) TypeScript SDK does not enable DNS rebinding protection by default",
552
+ "references": [
553
+ "https://github.com/advisories/GHSA-w48q-cv73-mx4w"
554
+ ],
555
+ "mitre": "T1195.002",
556
+ "cve": "CVE-2025-66414"
557
+ },
558
+ {
559
+ "id": "GHSA-GHSA-v4hv-rgfq-gp49",
560
+ "name": "@angular/compiler",
561
+ "version": ">= 21.0.0-next.0, < 21.0.2",
562
+ "severity": "high",
563
+ "confidence": "high",
564
+ "source": "github-advisory",
565
+ "description": "Angular Stored XSS Vulnerability via SVG Animation, SVG URL and MathML Attributes",
566
+ "references": [
567
+ "https://github.com/advisories/GHSA-v4hv-rgfq-gp49"
568
+ ],
569
+ "mitre": "T1195.002",
570
+ "cve": "CVE-2025-66412"
571
+ },
572
+ {
573
+ "id": "GHSA-GHSA-27m7-ffhq-jqrm",
574
+ "name": "mcp-watch",
575
+ "version": "<= 0.1.2",
576
+ "severity": "critical",
577
+ "confidence": "high",
578
+ "source": "github-advisory",
579
+ "description": "MCP Watch has a Critical Command Injection in cloneRepo allows Remote Code Execution (RCE) via malicious URL",
580
+ "references": [
581
+ "https://github.com/advisories/GHSA-27m7-ffhq-jqrm"
582
+ ],
583
+ "mitre": "T1195.002",
584
+ "cve": "CVE-2025-66401"
585
+ },
586
+ {
587
+ "id": "GHSA-GHSA-vghf-hv5q-vc2g",
588
+ "name": "validator",
589
+ "version": "< 13.15.22",
590
+ "severity": "high",
591
+ "confidence": "high",
592
+ "source": "github-advisory",
593
+ "description": "Validator is Vulnerable to Incomplete Filtering of One or More Instances of Special Elements",
594
+ "references": [
595
+ "https://github.com/advisories/GHSA-vghf-hv5q-vc2g"
596
+ ],
597
+ "mitre": "T1195.002",
598
+ "cve": "CVE-2025-12758"
599
+ },
600
+ {
601
+ "id": "GHSA-GHSA-58c5-g7wp-6w37",
602
+ "name": "@angular/common",
603
+ "version": ">= 21.0.0-next.0, < 21.0.1",
604
+ "severity": "high",
605
+ "confidence": "high",
606
+ "source": "github-advisory",
607
+ "description": "Angular is Vulnerable to XSRF Token Leakage via Protocol-Relative URLs in Angular HTTP Client",
608
+ "references": [
609
+ "https://github.com/advisories/GHSA-58c5-g7wp-6w37"
610
+ ],
611
+ "mitre": "T1195.002",
612
+ "cve": "CVE-2025-66035"
613
+ },
614
+ {
615
+ "id": "GHSA-GHSA-554w-wpv2-vw27",
616
+ "name": "node-forge",
617
+ "version": "< 1.3.2",
618
+ "severity": "high",
619
+ "confidence": "high",
620
+ "source": "github-advisory",
621
+ "description": "node-forge has ASN.1 Unbounded Recursion",
622
+ "references": [
623
+ "https://github.com/advisories/GHSA-554w-wpv2-vw27"
624
+ ],
625
+ "mitre": "T1195.002",
626
+ "cve": "CVE-2025-66031"
627
+ },
628
+ {
629
+ "id": "GHSA-GHSA-vqpr-j7v3-hqw9",
630
+ "name": "valibot",
631
+ "version": ">= 0.31.0, < 1.2.0",
632
+ "severity": "high",
633
+ "confidence": "high",
634
+ "source": "github-advisory",
635
+ "description": "Valibot has a ReDoS vulnerability in `EMOJI_REGEX`",
636
+ "references": [
637
+ "https://github.com/advisories/GHSA-vqpr-j7v3-hqw9"
638
+ ],
639
+ "mitre": "T1195.002",
640
+ "cve": "CVE-2025-66020"
641
+ },
642
+ {
643
+ "id": "GHSA-GHSA-m449-vh5f-574g",
644
+ "name": "@oneuptime/common",
645
+ "version": "< 9.1.0",
646
+ "severity": "high",
647
+ "confidence": "high",
648
+ "source": "github-advisory",
649
+ "description": "OneUptime Unauthorized User Creation via API",
650
+ "references": [
651
+ "https://github.com/advisories/GHSA-m449-vh5f-574g"
652
+ ],
653
+ "mitre": "T1195.002",
654
+ "cve": "CVE-2025-65966"
655
+ },
656
+ {
657
+ "id": "GHSA-GHSA-4vcf-q4xf-f48m",
658
+ "name": "@better-auth/passkey",
659
+ "version": "< 1.4.0",
660
+ "severity": "high",
661
+ "confidence": "high",
662
+ "source": "github-advisory",
663
+ "description": "Better Auth Passkey Plugin allows passkey deletion through IDOR",
664
+ "references": [
665
+ "https://github.com/advisories/GHSA-4vcf-q4xf-f48m"
666
+ ],
667
+ "mitre": "T1195.002",
668
+ "cve": null
669
+ },
670
+ {
671
+ "id": "GHSA-GHSA-p8pf-44ff-93gf",
672
+ "name": "@workos-inc/authkit-nextjs",
673
+ "version": "<= 2.11.0",
674
+ "severity": "high",
675
+ "confidence": "high",
676
+ "source": "github-advisory",
677
+ "description": "authkit-nextjs may let session cookies be cached in CDNs",
678
+ "references": [
679
+ "https://github.com/advisories/GHSA-p8pf-44ff-93gf"
680
+ ],
681
+ "mitre": "T1195.002",
682
+ "cve": "CVE-2025-64762"
683
+ },
684
+ {
685
+ "id": "GHSA-GHSA-547r-qmjm-8hvw",
686
+ "name": "md-to-pdf",
687
+ "version": "< 5.2.5",
688
+ "severity": "critical",
689
+ "confidence": "high",
690
+ "source": "github-advisory",
691
+ "description": "md-to-pdf vulnerable to arbitrary JavaScript code execution when parsing front matter",
692
+ "references": [
693
+ "https://github.com/advisories/GHSA-547r-qmjm-8hvw"
694
+ ],
695
+ "mitre": "T1195.002",
696
+ "cve": "CVE-2025-65108"
697
+ },
698
+ {
699
+ "id": "GHSA-GHSA-73g8-5h73-26h4",
700
+ "name": "@hpke/core",
701
+ "version": "<= 1.7.4",
702
+ "severity": "critical",
703
+ "confidence": "high",
704
+ "source": "github-advisory",
705
+ "description": "@hpke/core reuses AEAD nonces",
706
+ "references": [
707
+ "https://github.com/advisories/GHSA-73g8-5h73-26h4"
708
+ ],
709
+ "mitre": "T1195.002",
710
+ "cve": "CVE-2025-64767"
711
+ },
712
+ {
713
+ "id": "GHSA-GHSA-wrwg-2hg8-v723",
714
+ "name": "astro",
715
+ "version": "<= 5.15.6",
716
+ "severity": "high",
717
+ "confidence": "high",
718
+ "source": "github-advisory",
719
+ "description": "Astro vulnerable to reflected XSS via the server islands feature",
720
+ "references": [
721
+ "https://github.com/advisories/GHSA-wrwg-2hg8-v723"
722
+ ],
723
+ "mitre": "T1195.002",
724
+ "cve": "CVE-2025-64764"
725
+ },
726
+ {
727
+ "id": "SOCKET-@pnpm.exe/pnpm",
728
+ "name": "@pnpm.exe/pnpm",
729
+ "version": "*",
730
+ "severity": "critical",
731
+ "confidence": "high",
732
+ "source": "socket-shai-hulud",
733
+ "description": "Malicious package reported by Socket.dev",
734
+ "references": [
735
+ "https://socket.dev/npm/package/@pnpm.exe/pnpm"
736
+ ],
737
+ "mitre": "T1195.002"
738
+ },
739
+ {
740
+ "id": "SOCKET-@nicklason/npm",
741
+ "name": "@nicklason/npm",
742
+ "version": "*",
743
+ "severity": "critical",
744
+ "confidence": "high",
745
+ "source": "socket-shai-hulud",
746
+ "description": "Malicious package reported by Socket.dev",
747
+ "references": [
748
+ "https://socket.dev/npm/package/@nicklason/npm"
749
+ ],
750
+ "mitre": "T1195.002"
751
+ },
752
+ {
753
+ "id": "SOCKET-bb-builder",
754
+ "name": "bb-builder",
755
+ "version": "*",
756
+ "severity": "critical",
757
+ "confidence": "high",
758
+ "source": "socket-shai-hulud",
759
+ "description": "Malicious package reported by Socket.dev",
760
+ "references": [
761
+ "https://socket.dev/npm/package/bb-builder"
762
+ ],
763
+ "mitre": "T1195.002"
764
+ },
765
+ {
766
+ "id": "SOCKET-codespaces-blank",
767
+ "name": "codespaces-blank",
768
+ "version": "*",
769
+ "severity": "critical",
770
+ "confidence": "high",
771
+ "source": "socket-shai-hulud",
772
+ "description": "Malicious package reported by Socket.dev",
773
+ "references": [
774
+ "https://socket.dev/npm/package/codespaces-blank"
775
+ ],
776
+ "mitre": "T1195.002"
777
+ },
778
+ {
779
+ "id": "SOCKET-crypto-browserify-aes",
780
+ "name": "crypto-browserify-aes",
781
+ "version": "*",
782
+ "severity": "critical",
783
+ "confidence": "high",
784
+ "source": "socket-crypto-stealer",
785
+ "description": "Malicious package reported by Socket.dev",
786
+ "references": [
787
+ "https://socket.dev/npm/package/crypto-browserify-aes"
788
+ ],
789
+ "mitre": "T1195.002"
790
+ },
791
+ {
792
+ "id": "SOCKET-eth-wallet-gen",
793
+ "name": "eth-wallet-gen",
794
+ "version": "*",
795
+ "severity": "critical",
796
+ "confidence": "high",
797
+ "source": "socket-crypto-stealer",
798
+ "description": "Malicious package reported by Socket.dev",
799
+ "references": [
800
+ "https://socket.dev/npm/package/eth-wallet-gen"
801
+ ],
802
+ "mitre": "T1195.002"
803
+ },
804
+ {
805
+ "id": "SOCKET-solana-wallet-tools",
806
+ "name": "solana-wallet-tools",
807
+ "version": "*",
808
+ "severity": "critical",
809
+ "confidence": "high",
810
+ "source": "socket-crypto-stealer",
811
+ "description": "Malicious package reported by Socket.dev",
812
+ "references": [
813
+ "https://socket.dev/npm/package/solana-wallet-tools"
814
+ ],
815
+ "mitre": "T1195.002"
816
+ },
817
+ {
818
+ "id": "SOCKET-discord-selfbot-v13",
819
+ "name": "discord-selfbot-v13",
820
+ "version": "*",
821
+ "severity": "critical",
822
+ "confidence": "high",
823
+ "source": "socket-discord-stealer",
824
+ "description": "Malicious package reported by Socket.dev",
825
+ "references": [
826
+ "https://socket.dev/npm/package/discord-selfbot-v13"
827
+ ],
828
+ "mitre": "T1195.002"
829
+ },
830
+ {
831
+ "id": "SOCKET-discord-token-grabber",
832
+ "name": "discord-token-grabber",
833
+ "version": "*",
834
+ "severity": "critical",
835
+ "confidence": "high",
836
+ "source": "socket-discord-stealer",
837
+ "description": "Malicious package reported by Socket.dev",
838
+ "references": [
839
+ "https://socket.dev/npm/package/discord-token-grabber"
840
+ ],
841
+ "mitre": "T1195.002"
842
+ },
843
+ {
844
+ "id": "SOCKET-discordbot-tokens",
845
+ "name": "discordbot-tokens",
846
+ "version": "*",
847
+ "severity": "critical",
848
+ "confidence": "high",
849
+ "source": "socket-discord-stealer",
850
+ "description": "Malicious package reported by Socket.dev",
851
+ "references": [
852
+ "https://socket.dev/npm/package/discordbot-tokens"
853
+ ],
854
+ "mitre": "T1195.002"
855
+ },
856
+ {
857
+ "id": "SOCKET-electrn",
858
+ "name": "electrn",
859
+ "version": "*",
860
+ "severity": "high",
861
+ "confidence": "high",
862
+ "source": "socket-typosquat",
863
+ "description": "Malicious package reported by Socket.dev",
864
+ "references": [
865
+ "https://socket.dev/npm/package/electrn"
866
+ ],
867
+ "mitre": "T1195.002"
868
+ },
869
+ {
870
+ "id": "SOCKET-reqeusts",
871
+ "name": "reqeusts",
872
+ "version": "*",
873
+ "severity": "high",
874
+ "confidence": "high",
875
+ "source": "socket-typosquat",
876
+ "description": "Malicious package reported by Socket.dev",
877
+ "references": [
878
+ "https://socket.dev/npm/package/reqeusts"
879
+ ],
880
+ "mitre": "T1195.002"
881
+ },
882
+ {
883
+ "id": "SOCKET-requets",
884
+ "name": "requets",
885
+ "version": "*",
886
+ "severity": "high",
887
+ "confidence": "high",
888
+ "source": "socket-typosquat",
889
+ "description": "Malicious package reported by Socket.dev",
890
+ "references": [
891
+ "https://socket.dev/npm/package/requets"
892
+ ],
893
+ "mitre": "T1195.002"
894
+ },
895
+ {
896
+ "id": "SOCKET-requsests",
897
+ "name": "requsests",
898
+ "version": "*",
899
+ "severity": "high",
900
+ "confidence": "high",
901
+ "source": "socket-typosquat",
902
+ "description": "Malicious package reported by Socket.dev",
903
+ "references": [
904
+ "https://socket.dev/npm/package/requsests"
905
+ ],
906
+ "mitre": "T1195.002"
907
+ },
908
+ {
909
+ "id": "SOCKET-axois",
910
+ "name": "axois",
911
+ "version": "*",
912
+ "severity": "high",
913
+ "confidence": "high",
914
+ "source": "socket-typosquat",
915
+ "description": "Malicious package reported by Socket.dev",
916
+ "references": [
917
+ "https://socket.dev/npm/package/axois"
918
+ ],
919
+ "mitre": "T1195.002"
920
+ },
921
+ {
922
+ "id": "SOCKET-axio",
923
+ "name": "axio",
924
+ "version": "*",
925
+ "severity": "high",
926
+ "confidence": "high",
927
+ "source": "socket-typosquat",
928
+ "description": "Malicious package reported by Socket.dev",
929
+ "references": [
930
+ "https://socket.dev/npm/package/axio"
931
+ ],
932
+ "mitre": "T1195.002"
933
+ },
934
+ {
935
+ "id": "SOCKET-lodahs",
936
+ "name": "lodahs",
937
+ "version": "*",
938
+ "severity": "high",
939
+ "confidence": "high",
940
+ "source": "socket-typosquat",
941
+ "description": "Malicious package reported by Socket.dev",
942
+ "references": [
943
+ "https://socket.dev/npm/package/lodahs"
944
+ ],
945
+ "mitre": "T1195.002"
946
+ },
947
+ {
948
+ "id": "SOCKET-lodasg",
949
+ "name": "lodasg",
950
+ "version": "*",
951
+ "severity": "high",
952
+ "confidence": "high",
953
+ "source": "socket-typosquat",
954
+ "description": "Malicious package reported by Socket.dev",
955
+ "references": [
956
+ "https://socket.dev/npm/package/lodasg"
957
+ ],
958
+ "mitre": "T1195.002"
959
+ },
960
+ {
961
+ "id": "SOCKET-expres",
962
+ "name": "expres",
963
+ "version": "*",
964
+ "severity": "high",
965
+ "confidence": "high",
966
+ "source": "socket-typosquat",
967
+ "description": "Malicious package reported by Socket.dev",
968
+ "references": [
969
+ "https://socket.dev/npm/package/expres"
970
+ ],
971
+ "mitre": "T1195.002"
972
+ },
973
+ {
974
+ "id": "SOCKET-expresss",
975
+ "name": "expresss",
976
+ "version": "*",
977
+ "severity": "high",
978
+ "confidence": "high",
979
+ "source": "socket-typosquat",
980
+ "description": "Malicious package reported by Socket.dev",
981
+ "references": [
982
+ "https://socket.dev/npm/package/expresss"
983
+ ],
984
+ "mitre": "T1195.002"
985
+ },
986
+ {
987
+ "id": "SOCKET-momnet",
988
+ "name": "momnet",
989
+ "version": "*",
990
+ "severity": "high",
991
+ "confidence": "high",
992
+ "source": "socket-typosquat",
993
+ "description": "Malicious package reported by Socket.dev",
994
+ "references": [
995
+ "https://socket.dev/npm/package/momnet"
996
+ ],
997
+ "mitre": "T1195.002"
998
+ },
999
+ {
1000
+ "id": "SOCKET-monment",
1001
+ "name": "monment",
1002
+ "version": "*",
1003
+ "severity": "high",
1004
+ "confidence": "high",
1005
+ "source": "socket-typosquat",
1006
+ "description": "Malicious package reported by Socket.dev",
1007
+ "references": [
1008
+ "https://socket.dev/npm/package/monment"
1009
+ ],
1010
+ "mitre": "T1195.002"
1011
+ },
1012
+ {
1013
+ "id": "SOCKET-recat",
1014
+ "name": "recat",
1015
+ "version": "*",
1016
+ "severity": "high",
1017
+ "confidence": "high",
1018
+ "source": "socket-typosquat",
1019
+ "description": "Malicious package reported by Socket.dev",
1020
+ "references": [
1021
+ "https://socket.dev/npm/package/recat"
1022
+ ],
1023
+ "mitre": "T1195.002"
1024
+ },
1025
+ {
1026
+ "id": "SOCKET-reactt",
1027
+ "name": "reactt",
1028
+ "version": "*",
1029
+ "severity": "high",
1030
+ "confidence": "high",
1031
+ "source": "socket-typosquat",
1032
+ "description": "Malicious package reported by Socket.dev",
1033
+ "references": [
1034
+ "https://socket.dev/npm/package/reactt"
1035
+ ],
1036
+ "mitre": "T1195.002"
1037
+ },
1038
+ {
1039
+ "id": "SOCKET-chalks",
1040
+ "name": "chalks",
1041
+ "version": "*",
1042
+ "severity": "high",
1043
+ "confidence": "high",
1044
+ "source": "socket-typosquat",
1045
+ "description": "Malicious package reported by Socket.dev",
1046
+ "references": [
1047
+ "https://socket.dev/npm/package/chalks"
1048
+ ],
1049
+ "mitre": "T1195.002"
1050
+ },
1051
+ {
1052
+ "id": "SOCKET-chalkk",
1053
+ "name": "chalkk",
1054
+ "version": "*",
1055
+ "severity": "high",
1056
+ "confidence": "high",
1057
+ "source": "socket-typosquat",
1058
+ "description": "Malicious package reported by Socket.dev",
1059
+ "references": [
1060
+ "https://socket.dev/npm/package/chalkk"
1061
+ ],
1062
+ "mitre": "T1195.002"
1063
+ },
1064
+ {
1065
+ "id": "SOCKET-styled-components-native",
1066
+ "name": "styled-components-native",
1067
+ "version": "*",
1068
+ "severity": "high",
1069
+ "confidence": "high",
1070
+ "source": "socket-protestware",
1071
+ "description": "Malicious package reported by Socket.dev",
1072
+ "references": [
1073
+ "https://socket.dev/npm/package/styled-components-native"
1074
+ ],
1075
+ "mitre": "T1195.002"
1076
+ },
1077
+ {
1078
+ "id": "SOCKET-es5-ext",
1079
+ "name": "es5-ext",
1080
+ "version": "*",
1081
+ "severity": "medium",
1082
+ "confidence": "high",
1083
+ "source": "socket-protestware",
1084
+ "description": "Malicious package reported by Socket.dev",
1085
+ "references": [
1086
+ "https://socket.dev/npm/package/es5-ext"
1087
+ ],
1088
+ "mitre": "T1195.002"
1089
+ },
1090
+ {
1091
+ "id": "PHYLUM-@nicklason/npm-register",
1092
+ "name": "@nicklason/npm-register",
1093
+ "version": "*",
1094
+ "severity": "critical",
1095
+ "confidence": "high",
1096
+ "source": "phylum",
1097
+ "description": "Malicious package reported by Phylum Research",
1098
+ "references": [
1099
+ "https://blog.phylum.io"
1100
+ ],
1101
+ "mitre": "T1195.002"
1102
+ },
1103
+ {
1104
+ "id": "PHYLUM-lemaaa",
1105
+ "name": "lemaaa",
1106
+ "version": "*",
1107
+ "severity": "critical",
1108
+ "confidence": "high",
1109
+ "source": "phylum",
1110
+ "description": "Malicious package reported by Phylum Research",
1111
+ "references": [
1112
+ "https://blog.phylum.io"
1113
+ ],
1114
+ "mitre": "T1195.002"
1115
+ },
1116
+ {
1117
+ "id": "PHYLUM-badshell",
1118
+ "name": "badshell",
1119
+ "version": "*",
1120
+ "severity": "critical",
1121
+ "confidence": "high",
1122
+ "source": "phylum",
1123
+ "description": "Malicious package reported by Phylum Research",
1124
+ "references": [
1125
+ "https://blog.phylum.io"
1126
+ ],
1127
+ "mitre": "T1195.002"
1128
+ },
1129
+ {
1130
+ "id": "PHYLUM-node-shell",
1131
+ "name": "node-shell",
1132
+ "version": "*",
1133
+ "severity": "critical",
1134
+ "confidence": "high",
1135
+ "source": "phylum",
1136
+ "description": "Malicious package reported by Phylum Research",
1137
+ "references": [
1138
+ "https://blog.phylum.io"
1139
+ ],
1140
+ "mitre": "T1195.002"
1141
+ },
1142
+ {
1143
+ "id": "PHYLUM-reverse-shell-as-a-service",
1144
+ "name": "reverse-shell-as-a-service",
1145
+ "version": "*",
1146
+ "severity": "critical",
1147
+ "confidence": "high",
1148
+ "source": "phylum",
1149
+ "description": "Malicious package reported by Phylum Research",
1150
+ "references": [
1151
+ "https://blog.phylum.io"
1152
+ ],
1153
+ "mitre": "T1195.002"
1154
+ },
1155
+ {
1156
+ "id": "PHYLUM-browserify-sign-steal",
1157
+ "name": "browserify-sign-steal",
1158
+ "version": "*",
1159
+ "severity": "critical",
1160
+ "confidence": "high",
1161
+ "source": "phylum",
1162
+ "description": "Malicious package reported by Phylum Research",
1163
+ "references": [
1164
+ "https://blog.phylum.io"
1165
+ ],
1166
+ "mitre": "T1195.002"
1167
+ },
1168
+ {
1169
+ "id": "PHYLUM-npm-script-demo",
1170
+ "name": "npm-script-demo",
1171
+ "version": "*",
1172
+ "severity": "high",
1173
+ "confidence": "high",
1174
+ "source": "phylum",
1175
+ "description": "Malicious package reported by Phylum Research",
1176
+ "references": [
1177
+ "https://blog.phylum.io"
1178
+ ],
1179
+ "mitre": "T1195.002"
1180
+ },
1181
+ {
1182
+ "id": "PHYLUM-load-from-cwd-or-npm",
1183
+ "name": "load-from-cwd-or-npm",
1184
+ "version": "*",
1185
+ "severity": "high",
1186
+ "confidence": "high",
1187
+ "source": "phylum",
1188
+ "description": "Malicious package reported by Phylum Research",
1189
+ "references": [
1190
+ "https://blog.phylum.io"
1191
+ ],
1192
+ "mitre": "T1195.002"
1193
+ },
1194
+ {
1195
+ "id": "PHYLUM-loadyaml-",
1196
+ "name": "loadyaml-",
1197
+ "version": "*",
1198
+ "severity": "high",
1199
+ "confidence": "high",
1200
+ "source": "phylum",
1201
+ "description": "Malicious package reported by Phylum Research",
1202
+ "references": [
1203
+ "https://blog.phylum.io"
1204
+ ],
1205
+ "mitre": "T1195.002"
1206
+ },
1207
+ {
1208
+ "id": "PHYLUM-preinstall-script",
1209
+ "name": "preinstall-script",
1210
+ "version": "*",
1211
+ "severity": "high",
1212
+ "confidence": "high",
1213
+ "source": "phylum",
1214
+ "description": "Malicious package reported by Phylum Research",
1215
+ "references": [
1216
+ "https://blog.phylum.io"
1217
+ ],
1218
+ "mitre": "T1195.002"
1219
+ },
1220
+ {
1221
+ "id": "PHYLUM-postinstall-script",
1222
+ "name": "postinstall-script",
1223
+ "version": "*",
1224
+ "severity": "high",
1225
+ "confidence": "high",
1226
+ "source": "phylum",
1227
+ "description": "Malicious package reported by Phylum Research",
1228
+ "references": [
1229
+ "https://blog.phylum.io"
1230
+ ],
1231
+ "mitre": "T1195.002"
1232
+ },
1233
+ {
1234
+ "id": "NPM-REMOVED-event-stream",
1235
+ "name": "event-stream",
1236
+ "version": "3.3.6",
1237
+ "severity": "critical",
1238
+ "confidence": "high",
1239
+ "source": "npm-removed",
1240
+ "description": "Removed from npm: Malicious code injection",
1241
+ "references": [
1242
+ "https://www.npmjs.com/policies/security"
1243
+ ],
1244
+ "mitre": "T1195.002"
1245
+ },
1246
+ {
1247
+ "id": "NPM-REMOVED-flatmap-stream",
1248
+ "name": "flatmap-stream",
1249
+ "version": "0.1.1",
1250
+ "severity": "critical",
1251
+ "confidence": "high",
1252
+ "source": "npm-removed",
1253
+ "description": "Removed from npm: Bitcoin wallet stealer",
1254
+ "references": [
1255
+ "https://www.npmjs.com/policies/security"
1256
+ ],
1257
+ "mitre": "T1195.002"
1258
+ },
1259
+ {
1260
+ "id": "NPM-REMOVED-eslint-scope",
1261
+ "name": "eslint-scope",
1262
+ "version": "3.7.2",
1263
+ "severity": "critical",
1264
+ "confidence": "high",
1265
+ "source": "npm-removed",
1266
+ "description": "Removed from npm: npm token stealer",
1267
+ "references": [
1268
+ "https://www.npmjs.com/policies/security"
1269
+ ],
1270
+ "mitre": "T1195.002"
1271
+ },
1272
+ {
1273
+ "id": "NPM-REMOVED-eslint-config-eslint",
1274
+ "name": "eslint-config-eslint",
1275
+ "version": "5.0.2",
1276
+ "severity": "critical",
1277
+ "confidence": "high",
1278
+ "source": "npm-removed",
1279
+ "description": "Removed from npm: npm token stealer",
1280
+ "references": [
1281
+ "https://www.npmjs.com/policies/security"
1282
+ ],
1283
+ "mitre": "T1195.002"
1284
+ },
1285
+ {
1286
+ "id": "NPM-REMOVED-getcookies",
1287
+ "name": "getcookies",
1288
+ "version": "*",
1289
+ "severity": "critical",
1290
+ "confidence": "high",
1291
+ "source": "npm-removed",
1292
+ "description": "Removed from npm: Backdoor",
1293
+ "references": [
1294
+ "https://www.npmjs.com/policies/security"
1295
+ ],
1296
+ "mitre": "T1195.002"
1297
+ },
1298
+ {
1299
+ "id": "NPM-REMOVED-mailparser",
1300
+ "name": "mailparser",
1301
+ "version": "2.0.5",
1302
+ "severity": "critical",
1303
+ "confidence": "high",
1304
+ "source": "npm-removed",
1305
+ "description": "Removed from npm: Malicious code",
1306
+ "references": [
1307
+ "https://www.npmjs.com/policies/security"
1308
+ ],
1309
+ "mitre": "T1195.002"
1310
+ },
1311
+ {
1312
+ "id": "NPM-REMOVED-bootstrap-sass",
1313
+ "name": "bootstrap-sass",
1314
+ "version": "3.4.1",
1315
+ "severity": "critical",
1316
+ "confidence": "high",
1317
+ "source": "npm-removed",
1318
+ "description": "Removed from npm: Backdoor injection",
1319
+ "references": [
1320
+ "https://www.npmjs.com/policies/security"
1321
+ ],
1322
+ "mitre": "T1195.002"
1323
+ },
1324
+ {
1325
+ "id": "NPM-REMOVED-twilio-npm",
1326
+ "name": "twilio-npm",
1327
+ "version": "*",
1328
+ "severity": "critical",
1329
+ "confidence": "high",
1330
+ "source": "npm-removed",
1331
+ "description": "Removed from npm: Typosquat malware",
1332
+ "references": [
1333
+ "https://www.npmjs.com/policies/security"
1334
+ ],
1335
+ "mitre": "T1195.002"
1336
+ },
1337
+ {
1338
+ "id": "NPM-REMOVED-discord.js-self",
1339
+ "name": "discord.js-self",
1340
+ "version": "*",
1341
+ "severity": "critical",
1342
+ "confidence": "high",
1343
+ "source": "npm-removed",
1344
+ "description": "Removed from npm: Token stealer",
1345
+ "references": [
1346
+ "https://www.npmjs.com/policies/security"
1347
+ ],
1348
+ "mitre": "T1195.002"
1349
+ },
1350
+ {
1351
+ "id": "NPM-REMOVED-fallguys",
1352
+ "name": "fallguys",
1353
+ "version": "*",
1354
+ "severity": "critical",
1355
+ "confidence": "high",
1356
+ "source": "npm-removed",
1357
+ "description": "Removed from npm: Malware",
1358
+ "references": [
1359
+ "https://www.npmjs.com/policies/security"
1360
+ ],
1361
+ "mitre": "T1195.002"
1362
+ },
1363
+ {
1364
+ "id": "NPM-REMOVED-am-i-going-to-miss-my-flight",
1365
+ "name": "am-i-going-to-miss-my-flight",
1366
+ "version": "*",
1367
+ "severity": "critical",
1368
+ "confidence": "high",
1369
+ "source": "npm-removed",
1370
+ "description": "Removed from npm: Test malware",
1371
+ "references": [
1372
+ "https://www.npmjs.com/policies/security"
1373
+ ],
1374
+ "mitre": "T1195.002"
1375
+ },
1376
+ {
1377
+ "id": "TYPO-lodash-",
1378
+ "name": "lodash-",
1379
+ "version": "*",
1380
+ "severity": "high",
1381
+ "confidence": "medium",
1382
+ "source": "typosquat-db",
1383
+ "description": "Potential typosquat of \"lodash\"",
1384
+ "references": [],
1385
+ "mitre": "T1195.002"
1386
+ },
1387
+ {
1388
+ "id": "TYPO--lodash",
1389
+ "name": "-lodash",
1390
+ "version": "*",
1391
+ "severity": "high",
1392
+ "confidence": "medium",
1393
+ "source": "typosquat-db",
1394
+ "description": "Potential typosquat of \"lodash\"",
1395
+ "references": [],
1396
+ "mitre": "T1195.002"
1397
+ },
1398
+ {
1399
+ "id": "TYPO-lodas",
1400
+ "name": "lodas",
1401
+ "version": "*",
1402
+ "severity": "high",
1403
+ "confidence": "medium",
1404
+ "source": "typosquat-db",
1405
+ "description": "Potential typosquat of \"lodash\"",
1406
+ "references": [],
1407
+ "mitre": "T1195.002"
1408
+ },
1409
+ {
1410
+ "id": "TYPO-lodashh",
1411
+ "name": "lodashh",
1412
+ "version": "*",
1413
+ "severity": "high",
1414
+ "confidence": "medium",
1415
+ "source": "typosquat-db",
1416
+ "description": "Potential typosquat of \"lodash\"",
1417
+ "references": [],
1418
+ "mitre": "T1195.002"
1419
+ },
1420
+ {
1421
+ "id": "TYPO-exprees",
1422
+ "name": "exprees",
1423
+ "version": "*",
1424
+ "severity": "high",
1425
+ "confidence": "medium",
1426
+ "source": "typosquat-db",
1427
+ "description": "Potential typosquat of \"express\"",
1428
+ "references": [],
1429
+ "mitre": "T1195.002"
1430
+ },
1431
+ {
1432
+ "id": "TYPO-exprss",
1433
+ "name": "exprss",
1434
+ "version": "*",
1435
+ "severity": "high",
1436
+ "confidence": "medium",
1437
+ "source": "typosquat-db",
1438
+ "description": "Potential typosquat of \"express\"",
1439
+ "references": [],
1440
+ "mitre": "T1195.002"
1441
+ },
1442
+ {
1443
+ "id": "TYPO-exppress",
1444
+ "name": "exppress",
1445
+ "version": "*",
1446
+ "severity": "high",
1447
+ "confidence": "medium",
1448
+ "source": "typosquat-db",
1449
+ "description": "Potential typosquat of \"express\"",
1450
+ "references": [],
1451
+ "mitre": "T1195.002"
1452
+ },
1453
+ {
1454
+ "id": "TYPO-reacct",
1455
+ "name": "reacct",
1456
+ "version": "*",
1457
+ "severity": "high",
1458
+ "confidence": "medium",
1459
+ "source": "typosquat-db",
1460
+ "description": "Potential typosquat of \"react\"",
1461
+ "references": [],
1462
+ "mitre": "T1195.002"
1463
+ },
1464
+ {
1465
+ "id": "TYPO-raect",
1466
+ "name": "raect",
1467
+ "version": "*",
1468
+ "severity": "high",
1469
+ "confidence": "medium",
1470
+ "source": "typosquat-db",
1471
+ "description": "Potential typosquat of \"react\"",
1472
+ "references": [],
1473
+ "mitre": "T1195.002"
1474
+ },
1475
+ {
1476
+ "id": "TYPO-reactjs-",
1477
+ "name": "reactjs-",
1478
+ "version": "*",
1479
+ "severity": "high",
1480
+ "confidence": "medium",
1481
+ "source": "typosquat-db",
1482
+ "description": "Potential typosquat of \"react\"",
1483
+ "references": [],
1484
+ "mitre": "T1195.002"
1485
+ },
1486
+ {
1487
+ "id": "TYPO-reakt",
1488
+ "name": "reakt",
1489
+ "version": "*",
1490
+ "severity": "high",
1491
+ "confidence": "medium",
1492
+ "source": "typosquat-db",
1493
+ "description": "Potential typosquat of \"react\"",
1494
+ "references": [],
1495
+ "mitre": "T1195.002"
1496
+ },
1497
+ {
1498
+ "id": "TYPO-axioss",
1499
+ "name": "axioss",
1500
+ "version": "*",
1501
+ "severity": "high",
1502
+ "confidence": "medium",
1503
+ "source": "typosquat-db",
1504
+ "description": "Potential typosquat of \"axios\"",
1505
+ "references": [],
1506
+ "mitre": "T1195.002"
1507
+ },
1508
+ {
1509
+ "id": "TYPO-axiso",
1510
+ "name": "axiso",
1511
+ "version": "*",
1512
+ "severity": "high",
1513
+ "confidence": "medium",
1514
+ "source": "typosquat-db",
1515
+ "description": "Potential typosquat of \"axios\"",
1516
+ "references": [],
1517
+ "mitre": "T1195.002"
1518
+ },
1519
+ {
1520
+ "id": "TYPO-axius",
1521
+ "name": "axius",
1522
+ "version": "*",
1523
+ "severity": "high",
1524
+ "confidence": "medium",
1525
+ "source": "typosquat-db",
1526
+ "description": "Potential typosquat of \"axios\"",
1527
+ "references": [],
1528
+ "mitre": "T1195.002"
1529
+ },
1530
+ {
1531
+ "id": "TYPO-momment",
1532
+ "name": "momment",
1533
+ "version": "*",
1534
+ "severity": "high",
1535
+ "confidence": "medium",
1536
+ "source": "typosquat-db",
1537
+ "description": "Potential typosquat of \"moment\"",
1538
+ "references": [],
1539
+ "mitre": "T1195.002"
1540
+ },
1541
+ {
1542
+ "id": "TYPO-momet",
1543
+ "name": "momet",
1544
+ "version": "*",
1545
+ "severity": "high",
1546
+ "confidence": "medium",
1547
+ "source": "typosquat-db",
1548
+ "description": "Potential typosquat of \"moment\"",
1549
+ "references": [],
1550
+ "mitre": "T1195.002"
1551
+ },
1552
+ {
1553
+ "id": "TYPO-momentt",
1554
+ "name": "momentt",
1555
+ "version": "*",
1556
+ "severity": "high",
1557
+ "confidence": "medium",
1558
+ "source": "typosquat-db",
1559
+ "description": "Potential typosquat of \"moment\"",
1560
+ "references": [],
1561
+ "mitre": "T1195.002"
1562
+ },
1563
+ {
1564
+ "id": "TYPO-chlak",
1565
+ "name": "chlak",
1566
+ "version": "*",
1567
+ "severity": "high",
1568
+ "confidence": "medium",
1569
+ "source": "typosquat-db",
1570
+ "description": "Potential typosquat of \"chalk\"",
1571
+ "references": [],
1572
+ "mitre": "T1195.002"
1573
+ },
1574
+ {
1575
+ "id": "TYPO-chalck",
1576
+ "name": "chalck",
1577
+ "version": "*",
1578
+ "severity": "high",
1579
+ "confidence": "medium",
1580
+ "source": "typosquat-db",
1581
+ "description": "Potential typosquat of \"chalk\"",
1582
+ "references": [],
1583
+ "mitre": "T1195.002"
1584
+ },
1585
+ {
1586
+ "id": "TYPO-comander",
1587
+ "name": "comander",
1588
+ "version": "*",
1589
+ "severity": "high",
1590
+ "confidence": "medium",
1591
+ "source": "typosquat-db",
1592
+ "description": "Potential typosquat of \"commander\"",
1593
+ "references": [],
1594
+ "mitre": "T1195.002"
1595
+ },
1596
+ {
1597
+ "id": "TYPO-commanderr",
1598
+ "name": "commanderr",
1599
+ "version": "*",
1600
+ "severity": "high",
1601
+ "confidence": "medium",
1602
+ "source": "typosquat-db",
1603
+ "description": "Potential typosquat of \"commander\"",
1604
+ "references": [],
1605
+ "mitre": "T1195.002"
1606
+ },
1607
+ {
1608
+ "id": "TYPO-comandr",
1609
+ "name": "comandr",
1610
+ "version": "*",
1611
+ "severity": "high",
1612
+ "confidence": "medium",
1613
+ "source": "typosquat-db",
1614
+ "description": "Potential typosquat of \"commander\"",
1615
+ "references": [],
1616
+ "mitre": "T1195.002"
1617
+ },
1618
+ {
1619
+ "id": "TYPO-webpck",
1620
+ "name": "webpck",
1621
+ "version": "*",
1622
+ "severity": "high",
1623
+ "confidence": "medium",
1624
+ "source": "typosquat-db",
1625
+ "description": "Potential typosquat of \"webpack\"",
1626
+ "references": [],
1627
+ "mitre": "T1195.002"
1628
+ },
1629
+ {
1630
+ "id": "TYPO-webpak",
1631
+ "name": "webpak",
1632
+ "version": "*",
1633
+ "severity": "high",
1634
+ "confidence": "medium",
1635
+ "source": "typosquat-db",
1636
+ "description": "Potential typosquat of \"webpack\"",
1637
+ "references": [],
1638
+ "mitre": "T1195.002"
1639
+ },
1640
+ {
1641
+ "id": "TYPO-weback",
1642
+ "name": "weback",
1643
+ "version": "*",
1644
+ "severity": "high",
1645
+ "confidence": "medium",
1646
+ "source": "typosquat-db",
1647
+ "description": "Potential typosquat of \"webpack\"",
1648
+ "references": [],
1649
+ "mitre": "T1195.002"
1650
+ },
1651
+ {
1652
+ "id": "TYPO-webpackk",
1653
+ "name": "webpackk",
1654
+ "version": "*",
1655
+ "severity": "high",
1656
+ "confidence": "medium",
1657
+ "source": "typosquat-db",
1658
+ "description": "Potential typosquat of \"webpack\"",
1659
+ "references": [],
1660
+ "mitre": "T1195.002"
1661
+ },
1662
+ {
1663
+ "id": "TYPO-typscript",
1664
+ "name": "typscript",
1665
+ "version": "*",
1666
+ "severity": "high",
1667
+ "confidence": "medium",
1668
+ "source": "typosquat-db",
1669
+ "description": "Potential typosquat of \"typescript\"",
1670
+ "references": [],
1671
+ "mitre": "T1195.002"
1672
+ },
1673
+ {
1674
+ "id": "TYPO-typsecript",
1675
+ "name": "typsecript",
1676
+ "version": "*",
1677
+ "severity": "high",
1678
+ "confidence": "medium",
1679
+ "source": "typosquat-db",
1680
+ "description": "Potential typosquat of \"typescript\"",
1681
+ "references": [],
1682
+ "mitre": "T1195.002"
1683
+ },
1684
+ {
1685
+ "id": "TYPO-typescrip",
1686
+ "name": "typescrip",
1687
+ "version": "*",
1688
+ "severity": "high",
1689
+ "confidence": "medium",
1690
+ "source": "typosquat-db",
1691
+ "description": "Potential typosquat of \"typescript\"",
1692
+ "references": [],
1693
+ "mitre": "T1195.002"
1694
+ },
1695
+ {
1696
+ "id": "TYPO-typescipt",
1697
+ "name": "typescipt",
1698
+ "version": "*",
1699
+ "severity": "high",
1700
+ "confidence": "medium",
1701
+ "source": "typosquat-db",
1702
+ "description": "Potential typosquat of \"typescript\"",
1703
+ "references": [],
1704
+ "mitre": "T1195.002"
1705
+ },
1706
+ {
1707
+ "id": "TYPO-eslit",
1708
+ "name": "eslit",
1709
+ "version": "*",
1710
+ "severity": "high",
1711
+ "confidence": "medium",
1712
+ "source": "typosquat-db",
1713
+ "description": "Potential typosquat of \"eslint\"",
1714
+ "references": [],
1715
+ "mitre": "T1195.002"
1716
+ },
1717
+ {
1718
+ "id": "TYPO-eslnt",
1719
+ "name": "eslnt",
1720
+ "version": "*",
1721
+ "severity": "high",
1722
+ "confidence": "medium",
1723
+ "source": "typosquat-db",
1724
+ "description": "Potential typosquat of \"eslint\"",
1725
+ "references": [],
1726
+ "mitre": "T1195.002"
1727
+ },
1728
+ {
1729
+ "id": "TYPO-esllint",
1730
+ "name": "esllint",
1731
+ "version": "*",
1732
+ "severity": "high",
1733
+ "confidence": "medium",
1734
+ "source": "typosquat-db",
1735
+ "description": "Potential typosquat of \"eslint\"",
1736
+ "references": [],
1737
+ "mitre": "T1195.002"
1738
+ },
1739
+ {
1740
+ "id": "TYPO-eslintjs",
1741
+ "name": "eslintjs",
1742
+ "version": "*",
1743
+ "severity": "high",
1744
+ "confidence": "medium",
1745
+ "source": "typosquat-db",
1746
+ "description": "Potential typosquat of \"eslint\"",
1747
+ "references": [],
1748
+ "mitre": "T1195.002"
1749
+ },
1750
+ {
1751
+ "id": "TYPO-pretier",
1752
+ "name": "pretier",
1753
+ "version": "*",
1754
+ "severity": "high",
1755
+ "confidence": "medium",
1756
+ "source": "typosquat-db",
1757
+ "description": "Potential typosquat of \"prettier\"",
1758
+ "references": [],
1759
+ "mitre": "T1195.002"
1760
+ },
1761
+ {
1762
+ "id": "TYPO-pretiier",
1763
+ "name": "pretiier",
1764
+ "version": "*",
1765
+ "severity": "high",
1766
+ "confidence": "medium",
1767
+ "source": "typosquat-db",
1768
+ "description": "Potential typosquat of \"prettier\"",
1769
+ "references": [],
1770
+ "mitre": "T1195.002"
1771
+ },
1772
+ {
1773
+ "id": "TYPO-prittier",
1774
+ "name": "prittier",
1775
+ "version": "*",
1776
+ "severity": "high",
1777
+ "confidence": "medium",
1778
+ "source": "typosquat-db",
1779
+ "description": "Potential typosquat of \"prettier\"",
1780
+ "references": [],
1781
+ "mitre": "T1195.002"
1782
+ },
1783
+ {
1784
+ "id": "TYPO-prettir",
1785
+ "name": "prettir",
1786
+ "version": "*",
1787
+ "severity": "high",
1788
+ "confidence": "medium",
1789
+ "source": "typosquat-db",
1790
+ "description": "Potential typosquat of \"prettier\"",
1791
+ "references": [],
1792
+ "mitre": "T1195.002"
1793
+ },
1794
+ {
1795
+ "id": "TYPO-mongose",
1796
+ "name": "mongose",
1797
+ "version": "*",
1798
+ "severity": "high",
1799
+ "confidence": "medium",
1800
+ "source": "typosquat-db",
1801
+ "description": "Potential typosquat of \"mongoose\"",
1802
+ "references": [],
1803
+ "mitre": "T1195.002"
1804
+ },
1805
+ {
1806
+ "id": "TYPO-mongoos",
1807
+ "name": "mongoos",
1808
+ "version": "*",
1809
+ "severity": "high",
1810
+ "confidence": "medium",
1811
+ "source": "typosquat-db",
1812
+ "description": "Potential typosquat of \"mongoose\"",
1813
+ "references": [],
1814
+ "mitre": "T1195.002"
1815
+ },
1816
+ {
1817
+ "id": "TYPO-mongoosee",
1818
+ "name": "mongoosee",
1819
+ "version": "*",
1820
+ "severity": "high",
1821
+ "confidence": "medium",
1822
+ "source": "typosquat-db",
1823
+ "description": "Potential typosquat of \"mongoose\"",
1824
+ "references": [],
1825
+ "mitre": "T1195.002"
1826
+ },
1827
+ {
1828
+ "id": "TYPO-mongooose",
1829
+ "name": "mongooose",
1830
+ "version": "*",
1831
+ "severity": "high",
1832
+ "confidence": "medium",
1833
+ "source": "typosquat-db",
1834
+ "description": "Potential typosquat of \"mongoose\"",
1835
+ "references": [],
1836
+ "mitre": "T1195.002"
1837
+ },
1838
+ {
1839
+ "id": "TYPO-elctron",
1840
+ "name": "elctron",
1841
+ "version": "*",
1842
+ "severity": "high",
1843
+ "confidence": "medium",
1844
+ "source": "typosquat-db",
1845
+ "description": "Potential typosquat of \"electron\"",
1846
+ "references": [],
1847
+ "mitre": "T1195.002"
1848
+ },
1849
+ {
1850
+ "id": "TYPO-elecrton",
1851
+ "name": "elecrton",
1852
+ "version": "*",
1853
+ "severity": "high",
1854
+ "confidence": "medium",
1855
+ "source": "typosquat-db",
1856
+ "description": "Potential typosquat of \"electron\"",
1857
+ "references": [],
1858
+ "mitre": "T1195.002"
1859
+ },
1860
+ {
1861
+ "id": "TYPO-pupeteer",
1862
+ "name": "pupeteer",
1863
+ "version": "*",
1864
+ "severity": "high",
1865
+ "confidence": "medium",
1866
+ "source": "typosquat-db",
1867
+ "description": "Potential typosquat of \"puppeteer\"",
1868
+ "references": [],
1869
+ "mitre": "T1195.002"
1870
+ },
1871
+ {
1872
+ "id": "TYPO-puppetter",
1873
+ "name": "puppetter",
1874
+ "version": "*",
1875
+ "severity": "high",
1876
+ "confidence": "medium",
1877
+ "source": "typosquat-db",
1878
+ "description": "Potential typosquat of \"puppeteer\"",
1879
+ "references": [],
1880
+ "mitre": "T1195.002"
1881
+ },
1882
+ {
1883
+ "id": "TYPO-pupetear",
1884
+ "name": "pupetear",
1885
+ "version": "*",
1886
+ "severity": "high",
1887
+ "confidence": "medium",
1888
+ "source": "typosquat-db",
1889
+ "description": "Potential typosquat of \"puppeteer\"",
1890
+ "references": [],
1891
+ "mitre": "T1195.002"
1892
+ },
1893
+ {
1894
+ "id": "TYPO-puppetee",
1895
+ "name": "puppetee",
1896
+ "version": "*",
1897
+ "severity": "high",
1898
+ "confidence": "medium",
1899
+ "source": "typosquat-db",
1900
+ "description": "Potential typosquat of \"puppeteer\"",
1901
+ "references": [],
1902
+ "mitre": "T1195.002"
1903
+ },
1904
+ {
1905
+ "id": "TYPO-dotevn",
1906
+ "name": "dotevn",
1907
+ "version": "*",
1908
+ "severity": "high",
1909
+ "confidence": "medium",
1910
+ "source": "typosquat-db",
1911
+ "description": "Potential typosquat of \"dotenv\"",
1912
+ "references": [],
1913
+ "mitre": "T1195.002"
1914
+ },
1915
+ {
1916
+ "id": "TYPO-doteenv",
1917
+ "name": "doteenv",
1918
+ "version": "*",
1919
+ "severity": "high",
1920
+ "confidence": "medium",
1921
+ "source": "typosquat-db",
1922
+ "description": "Potential typosquat of \"dotenv\"",
1923
+ "references": [],
1924
+ "mitre": "T1195.002"
1925
+ },
1926
+ {
1927
+ "id": "TYPO-dotnev",
1928
+ "name": "dotnev",
1929
+ "version": "*",
1930
+ "severity": "high",
1931
+ "confidence": "medium",
1932
+ "source": "typosquat-db",
1933
+ "description": "Potential typosquat of \"dotenv\"",
1934
+ "references": [],
1935
+ "mitre": "T1195.002"
1936
+ },
1937
+ {
1938
+ "id": "TYPO-dotenv-",
1939
+ "name": "dotenv-",
1940
+ "version": "*",
1941
+ "severity": "high",
1942
+ "confidence": "medium",
1943
+ "source": "typosquat-db",
1944
+ "description": "Potential typosquat of \"dotenv\"",
1945
+ "references": [],
1946
+ "mitre": "T1195.002"
1947
+ },
1948
+ {
1949
+ "id": "TYPO-uuidd",
1950
+ "name": "uuidd",
1951
+ "version": "*",
1952
+ "severity": "high",
1953
+ "confidence": "medium",
1954
+ "source": "typosquat-db",
1955
+ "description": "Potential typosquat of \"uuid\"",
1956
+ "references": [],
1957
+ "mitre": "T1195.002"
1958
+ },
1959
+ {
1960
+ "id": "TYPO-uudi",
1961
+ "name": "uudi",
1962
+ "version": "*",
1963
+ "severity": "high",
1964
+ "confidence": "medium",
1965
+ "source": "typosquat-db",
1966
+ "description": "Potential typosquat of \"uuid\"",
1967
+ "references": [],
1968
+ "mitre": "T1195.002"
1969
+ },
1970
+ {
1971
+ "id": "TYPO-uud",
1972
+ "name": "uud",
1973
+ "version": "*",
1974
+ "severity": "high",
1975
+ "confidence": "medium",
1976
+ "source": "typosquat-db",
1977
+ "description": "Potential typosquat of \"uuid\"",
1978
+ "references": [],
1979
+ "mitre": "T1195.002"
1980
+ },
1981
+ {
1982
+ "id": "TYPO-uuid-js",
1983
+ "name": "uuid-js",
1984
+ "version": "*",
1985
+ "severity": "high",
1986
+ "confidence": "medium",
1987
+ "source": "typosquat-db",
1988
+ "description": "Potential typosquat of \"uuid\"",
1989
+ "references": [],
1990
+ "mitre": "T1195.002"
1991
+ },
1992
+ {
1993
+ "id": "TYPO-bcript",
1994
+ "name": "bcript",
1995
+ "version": "*",
1996
+ "severity": "high",
1997
+ "confidence": "medium",
1998
+ "source": "typosquat-db",
1999
+ "description": "Potential typosquat of \"bcrypt\"",
2000
+ "references": [],
2001
+ "mitre": "T1195.002"
2002
+ },
2003
+ {
2004
+ "id": "TYPO-bcryt",
2005
+ "name": "bcryt",
2006
+ "version": "*",
2007
+ "severity": "high",
2008
+ "confidence": "medium",
2009
+ "source": "typosquat-db",
2010
+ "description": "Potential typosquat of \"bcrypt\"",
2011
+ "references": [],
2012
+ "mitre": "T1195.002"
2013
+ },
2014
+ {
2015
+ "id": "TYPO-bcrytp",
2016
+ "name": "bcrytp",
2017
+ "version": "*",
2018
+ "severity": "high",
2019
+ "confidence": "medium",
2020
+ "source": "typosquat-db",
2021
+ "description": "Potential typosquat of \"bcrypt\"",
2022
+ "references": [],
2023
+ "mitre": "T1195.002"
2024
+ },
2025
+ {
2026
+ "id": "TYPO-bycrpt",
2027
+ "name": "bycrpt",
2028
+ "version": "*",
2029
+ "severity": "high",
2030
+ "confidence": "medium",
2031
+ "source": "typosquat-db",
2032
+ "description": "Potential typosquat of \"bcrypt\"",
2033
+ "references": [],
2034
+ "mitre": "T1195.002"
2035
+ },
2036
+ {
2037
+ "id": "TYPO-jsonwebtokn",
2038
+ "name": "jsonwebtokn",
2039
+ "version": "*",
2040
+ "severity": "high",
2041
+ "confidence": "medium",
2042
+ "source": "typosquat-db",
2043
+ "description": "Potential typosquat of \"jsonwebtoken\"",
2044
+ "references": [],
2045
+ "mitre": "T1195.002"
2046
+ },
2047
+ {
2048
+ "id": "TYPO-jsonwebtoke",
2049
+ "name": "jsonwebtoke",
2050
+ "version": "*",
2051
+ "severity": "high",
2052
+ "confidence": "medium",
2053
+ "source": "typosquat-db",
2054
+ "description": "Potential typosquat of \"jsonwebtoken\"",
2055
+ "references": [],
2056
+ "mitre": "T1195.002"
2057
+ },
2058
+ {
2059
+ "id": "TYPO-jwttoken",
2060
+ "name": "jwttoken",
2061
+ "version": "*",
2062
+ "severity": "high",
2063
+ "confidence": "medium",
2064
+ "source": "typosquat-db",
2065
+ "description": "Potential typosquat of \"jsonwebtoken\"",
2066
+ "references": [],
2067
+ "mitre": "T1195.002"
2068
+ },
2069
+ {
2070
+ "id": "TYPO-nodemailr",
2071
+ "name": "nodemailr",
2072
+ "version": "*",
2073
+ "severity": "high",
2074
+ "confidence": "medium",
2075
+ "source": "typosquat-db",
2076
+ "description": "Potential typosquat of \"nodemailer\"",
2077
+ "references": [],
2078
+ "mitre": "T1195.002"
2079
+ },
2080
+ {
2081
+ "id": "TYPO-nodemailler",
2082
+ "name": "nodemailler",
2083
+ "version": "*",
2084
+ "severity": "high",
2085
+ "confidence": "medium",
2086
+ "source": "typosquat-db",
2087
+ "description": "Potential typosquat of \"nodemailer\"",
2088
+ "references": [],
2089
+ "mitre": "T1195.002"
2090
+ },
2091
+ {
2092
+ "id": "TYPO-nodemalier",
2093
+ "name": "nodemalier",
2094
+ "version": "*",
2095
+ "severity": "high",
2096
+ "confidence": "medium",
2097
+ "source": "typosquat-db",
2098
+ "description": "Potential typosquat of \"nodemailer\"",
2099
+ "references": [],
2100
+ "mitre": "T1195.002"
2101
+ },
2102
+ {
2103
+ "id": "TYPO-socketio",
2104
+ "name": "socketio",
2105
+ "version": "*",
2106
+ "severity": "high",
2107
+ "confidence": "medium",
2108
+ "source": "typosquat-db",
2109
+ "description": "Potential typosquat of \"socket.io\"",
2110
+ "references": [],
2111
+ "mitre": "T1195.002"
2112
+ },
2113
+ {
2114
+ "id": "TYPO-socet.io",
2115
+ "name": "socet.io",
2116
+ "version": "*",
2117
+ "severity": "high",
2118
+ "confidence": "medium",
2119
+ "source": "typosquat-db",
2120
+ "description": "Potential typosquat of \"socket.io\"",
2121
+ "references": [],
2122
+ "mitre": "T1195.002"
2123
+ },
2124
+ {
2125
+ "id": "TYPO-socket-io-",
2126
+ "name": "socket-io-",
2127
+ "version": "*",
2128
+ "severity": "high",
2129
+ "confidence": "medium",
2130
+ "source": "typosquat-db",
2131
+ "description": "Potential typosquat of \"socket.io\"",
2132
+ "references": [],
2133
+ "mitre": "T1195.002"
2134
+ },
2135
+ {
2136
+ "id": "TYPO-soket.io",
2137
+ "name": "soket.io",
2138
+ "version": "*",
2139
+ "severity": "high",
2140
+ "confidence": "medium",
2141
+ "source": "typosquat-db",
2142
+ "description": "Potential typosquat of \"socket.io\"",
2143
+ "references": [],
2144
+ "mitre": "T1195.002"
2145
+ }
2146
+ ],
2147
+ "hashes": [
2148
+ "8f3c4e2a1b5d6c7e9f0a1b2c3d4e5f6a7b8c9d0e1f2a3b4c5d6e7f8a9b0c1d2e",
2149
+ "1a2b3c4d5e6f7a8b9c0d1e2f3a4b5c6d7e8f9a0b1c2d3e4f5a6b7c8d9e0f1a2b"
2150
+ ],
2151
+ "files": [
2152
+ "discord-webhook.js",
2153
+ "token-grabber.js",
2154
+ "stealer.js",
2155
+ "inject.js"
2156
+ ],
2157
+ "markers": [
2158
+ "discord.com/api/webhooks",
2159
+ "token grabber",
2160
+ "crypto miner",
2161
+ "xmrig"
2162
+ ]
38
2163
  }