You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Assigned RUSTSEC-2023-0097 to lazystatic, RUSTSEC-2023-0098 to if-cfg, RUSTSEC-2023-0099 to envlogger, RUSTSEC-2023-0100 to xrvrv, RUSTSEC-2023-0101 to oncecell, RUSTSEC-2023-0102 to serd, RUSTSEC-2023-0103 to postgress
# `envlogger` was removed from crates.io for malicious code
15
-
16
-
This crate was part of a typosquatting malware cluster published by the malicious user `amaperf` and contained a malware payload in build.rs to exfiltrate host information to the attacker.
17
-
18
-
This advisory is to retrospectively document this attempted attack. The version information and download records of the malicious crate are no longer available. The related malicious crates have been yanked, and the malicious account has been banned.
19
-
20
-
Thanks to [Veracode](https://www.veracode.com/) (formerly phylum)for
# `envlogger` was removed from crates.io for malicious code
15
+
16
+
This crate was part of a typosquatting malware cluster published by the malicious user `amaperf` and contained a malware payload in build.rs to exfiltrate host information to the attacker.
17
+
18
+
This advisory is to retrospectively document this attempted attack. The version information and download records of the malicious crate are no longer available. The related malicious crates have been yanked, and the malicious account has been banned.
19
+
20
+
Thanks to [Veracode](https://www.veracode.com/) (formerly phylum)for
# `if-cfg` was removed from crates.io for malicious code
15
-
16
-
This crate was part of a typosquatting malware cluster published by the malicious user `amaperf` and contained a malware payload in build.rs to exfiltrate host information to the attacker.
17
-
18
-
This advisory is to retrospectively document this attempted attack. The version information and download records of the malicious crate are no longer available. The related malicious crates have been yanked, and the malicious account has been banned.
19
-
20
-
Thanks to [Veracode](https://www.veracode.com/) (formerly phylum)for
# `if-cfg` was removed from crates.io for malicious code
15
+
16
+
This crate was part of a typosquatting malware cluster published by the malicious user `amaperf` and contained a malware payload in build.rs to exfiltrate host information to the attacker.
17
+
18
+
This advisory is to retrospectively document this attempted attack. The version information and download records of the malicious crate are no longer available. The related malicious crates have been yanked, and the malicious account has been banned.
19
+
20
+
Thanks to [Veracode](https://www.veracode.com/) (formerly phylum)for
# `lazystatic` was removed from crates.io for malicious code
15
-
16
-
This crate was part of a typosquatting malware cluster published by the malicious user `amaperf` and contained a malware payload in build.rs to exfiltrate host information to the attacker.
17
-
18
-
This advisory is to retrospectively document this attempted attack. The version information and download records of the malicious crate are no longer available. The related malicious crates have been yanked, and the malicious account has been banned.
19
-
20
-
Thanks to [Veracode](https://www.veracode.com/) (formerly phylum)for
# `lazystatic` was removed from crates.io for malicious code
15
+
16
+
This crate was part of a typosquatting malware cluster published by the malicious user `amaperf` and contained a malware payload in build.rs to exfiltrate host information to the attacker.
17
+
18
+
This advisory is to retrospectively document this attempted attack. The version information and download records of the malicious crate are no longer available. The related malicious crates have been yanked, and the malicious account has been banned.
19
+
20
+
Thanks to [Veracode](https://www.veracode.com/) (formerly phylum)for
# `oncecell` was removed from crates.io for malicious code
15
-
16
-
This crate was part of a typosquatting malware cluster published by the malicious user `amaperf` and contained a malware payload in build.rs to exfiltrate host information to the attacker.
17
-
18
-
This advisory is to retrospectively document this attempted attack. The version information and download records of the malicious crate are no longer available. The related malicious crates have been yanked, and the malicious account has been banned.
19
-
20
-
Thanks to [Veracode](https://www.veracode.com/) (formerly phylum)for
# `oncecell` was removed from crates.io for malicious code
15
+
16
+
This crate was part of a typosquatting malware cluster published by the malicious user `amaperf` and contained a malware payload in build.rs to exfiltrate host information to the attacker.
17
+
18
+
This advisory is to retrospectively document this attempted attack. The version information and download records of the malicious crate are no longer available. The related malicious crates have been yanked, and the malicious account has been banned.
19
+
20
+
Thanks to [Veracode](https://www.veracode.com/) (formerly phylum)for
# `postgress` was removed from crates.io for malicious code
15
-
16
-
This crate was part of a typosquatting malware cluster published by the malicious user `amaperf` and contained a malware payload in build.rs to exfiltrate host information to the attacker.
17
-
18
-
This advisory is to retrospectively document this attempted attack. The version information and download records of the malicious crate are no longer available. The related malicious crates have been yanked, and the malicious account has been banned.
19
-
20
-
Thanks to [Veracode](https://www.veracode.com/) (formerly phylum)for
# `postgress` was removed from crates.io for malicious code
15
+
16
+
This crate was part of a typosquatting malware cluster published by the malicious user `amaperf` and contained a malware payload in build.rs to exfiltrate host information to the attacker.
17
+
18
+
This advisory is to retrospectively document this attempted attack. The version information and download records of the malicious crate are no longer available. The related malicious crates have been yanked, and the malicious account has been banned.
19
+
20
+
Thanks to [Veracode](https://www.veracode.com/) (formerly phylum)for
# `serd` was removed from crates.io for malicious code
15
-
16
-
This crate was part of a typosquatting malware cluster published by the malicious user `amaperf` and contained a malware payload in build.rs to exfiltrate host information to the attacker.
17
-
18
-
This advisory is to retrospectively document this attempted attack. The version information and download records of the malicious crate are no longer available. The related malicious crates have been yanked, and the malicious account has been banned.
19
-
20
-
Thanks to [Veracode](https://www.veracode.com/) (formerly phylum)for
# `serd` was removed from crates.io for malicious code
15
+
16
+
This crate was part of a typosquatting malware cluster published by the malicious user `amaperf` and contained a malware payload in build.rs to exfiltrate host information to the attacker.
17
+
18
+
This advisory is to retrospectively document this attempted attack. The version information and download records of the malicious crate are no longer available. The related malicious crates have been yanked, and the malicious account has been banned.
19
+
20
+
Thanks to [Veracode](https://www.veracode.com/) (formerly phylum)for
# `xrvrv` was removed from crates.io for malicious code
15
-
16
-
This crate was part of a typosquatting malware cluster published by the malicious user `amaperf` and contained a malware payload in build.rs to exfiltrate host information to the attacker.
17
-
18
-
This advisory is to retrospectively document this attempted attack. The version information and download records of the malicious crate are no longer available. The related malicious crates have been yanked, and the malicious account has been banned.
19
-
20
-
Thanks to [Veracode](https://www.veracode.com/) (formerly phylum)for
# `xrvrv` was removed from crates.io for malicious code
15
+
16
+
This crate was part of a typosquatting malware cluster published by the malicious user `amaperf` and contained a malware payload in build.rs to exfiltrate host information to the attacker.
17
+
18
+
This advisory is to retrospectively document this attempted attack. The version information and download records of the malicious crate are no longer available. The related malicious crates have been yanked, and the malicious account has been banned.
19
+
20
+
Thanks to [Veracode](https://www.veracode.com/) (formerly phylum)for
0 commit comments