Lookup for vulnerable packages by Package URL.

Purlpkg:npm/reques@0.0.1-security
Typenpm
Namespace
Namereques
Version0.0.1-security
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1118-wfde-6yax
vulnerability_id VCID-1118-wfde-6yax
summary
Malicious Package in reques
All versions of `reques` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.


## Recommendation

Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
references
0
reference_url https://www.npmjs.com/advisories/863
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.npmjs.com/advisories/863
1
reference_url https://github.com/advisories/GHSA-g8jc-mm3c-cwhj
reference_id GHSA-g8jc-mm3c-cwhj
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-g8jc-mm3c-cwhj
fixed_packages
aliases GHSA-g8jc-mm3c-cwhj, GMS-2020-464
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1118-wfde-6yax
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:npm/reques@0.0.1-security