SB2019102914 - Backdoors in multiple nmp packages from Andre Eleuterio
Published: October 29, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 72 secuirty vulnerabilities.
1) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
2) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
3) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
4) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
5) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
6) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
7) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
8) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
9) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
10) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
11) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
12) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
13) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
14) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
15) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
16) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
17) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
18) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
19) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
20) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
21) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
22) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
23) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
24) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
25) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
26) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
27) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
28) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
29) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
30) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
31) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
32) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
33) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
34) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
35) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
36) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
37) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
38) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
39) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
40) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
41) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
42) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
43) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
44) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
45) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
46) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
47) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
48) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
49) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
50) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
51) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
52) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
53) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
54) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
55) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
56) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
57) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
58) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
59) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
60) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
61) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
62) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
63) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
64) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
65) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
66) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
67) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
68) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
69) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
70) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
71) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
72) Embedded malicious code (backdoor) (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that was designed to target the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.
References
- https://www.npmjs.com/advisories/1228
- https://www.npmjs.com/advisories/1229
- https://www.npmjs.com/advisories/1230
- https://www.npmjs.com/advisories/1231
- https://www.npmjs.com/advisories/1232
- https://www.npmjs.com/advisories/1233
- https://www.npmjs.com/advisories/1234
- https://www.npmjs.com/advisories/1235
- https://www.npmjs.com/advisories/1236
- https://www.npmjs.com/advisories/1237
- https://www.npmjs.com/advisories/1238
- https://www.npmjs.com/advisories/1239
- https://www.npmjs.com/advisories/1240
- https://www.npmjs.com/advisories/1241
- https://www.npmjs.com/advisories/1242
- https://www.npmjs.com/advisories/1243
- https://www.npmjs.com/advisories/1244
- https://www.npmjs.com/advisories/1245
- https://www.npmjs.com/advisories/1246
- https://www.npmjs.com/advisories/1247
- https://www.npmjs.com/advisories/1248
- https://www.npmjs.com/advisories/1249
- https://www.npmjs.com/advisories/1250
- https://www.npmjs.com/advisories/1251
- https://www.npmjs.com/advisories/1252
- https://www.npmjs.com/advisories/1253
- https://www.npmjs.com/advisories/1254
- https://www.npmjs.com/advisories/1255
- https://www.npmjs.com/advisories/1256
- https://www.npmjs.com/advisories/1257
- https://www.npmjs.com/advisories/1258
- https://www.npmjs.com/advisories/1259
- https://www.npmjs.com/advisories/1260
- https://www.npmjs.com/advisories/1261
- https://www.npmjs.com/advisories/1262
- https://www.npmjs.com/advisories/1263
- https://www.npmjs.com/advisories/1264
- https://www.npmjs.com/advisories/1265
- https://www.npmjs.com/advisories/1266
- https://www.npmjs.com/advisories/1267
- https://www.npmjs.com/advisories/1268
- https://www.npmjs.com/advisories/1269
- https://www.npmjs.com/advisories/1270
- https://www.npmjs.com/advisories/1271
- https://www.npmjs.com/advisories/1272
- https://www.npmjs.com/advisories/1273
- https://www.npmjs.com/advisories/1274
- https://www.npmjs.com/advisories/1275
- https://www.npmjs.com/advisories/1276
- https://www.npmjs.com/advisories/1277
- https://www.npmjs.com/advisories/1278
- https://www.npmjs.com/advisories/1279
- https://www.npmjs.com/advisories/1280
- https://www.npmjs.com/advisories/1281
- https://www.npmjs.com/advisories/1282
- https://www.npmjs.com/advisories/1283
- https://www.npmjs.com/advisories/1284
- https://www.npmjs.com/advisories/1285
- https://www.npmjs.com/advisories/1286
- https://www.npmjs.com/advisories/1287
- https://www.npmjs.com/advisories/1288
- https://www.npmjs.com/advisories/1289
- https://www.npmjs.com/advisories/1290
- https://www.npmjs.com/advisories/1291
- https://www.npmjs.com/advisories/1292
- https://www.npmjs.com/advisories/1293
- https://www.npmjs.com/advisories/1294
- https://www.npmjs.com/advisories/1295
- https://www.npmjs.com/advisories/1296
- https://www.npmjs.com/advisories/1297
- https://www.npmjs.com/advisories/1298
- https://www.npmjs.com/advisories/1299