It was discovered that the npm command-line interface mishandled certain sensitive information. An attacker could use this vulnerability to collect authentication information that could be used to impersonate other users.
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_version": "3.5.2-0ubuntu4.1.16.04.1~esm1", "binary_name": "npm" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_version": "3.5.2-0ubuntu4.1.18.04.1~esm1", "binary_name": "npm" } ] }