@employee-experience/common 999.9.9 → 999.9.11

Sign up to get free protection for your applications and to get access to all the features.
Files changed (1) hide show
  1. package/package.json +2 -2
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@employee-experience/common",
3
- "version": "999.9.9",
4
- "description": "My email address: contact@bugbounty.click - This package was created for ethical hacking purposes only. https://www.microsoft.com/en-us/msrc/bounty If you're reading this, then if I was a malicious hacker then I could have control over your machine. Please see https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610 for the technical description if you are interested. However, please don't report this package to the NPM registry as I have created it for bug bounty purposes. For example, as you can see here the vulnerability has been reported to Hacker1 and been rewarded for (note this is not my report): https://hackerone.com/reports/1104693 If this has broken something then I'm sorry - however, please contact your internal security department/bug bounty administrator and pass on this message and email address. If you leave this on NPM and I receive a callback to my server at https://bugbounty.click then I can prove the vulnerability, and once it is reported it can be fixed before anyone malicious exploits it for bad. I hope I have made myself clear, please report this to your organisational security team. Thank you - bugbounty.click",
3
+ "version": "999.9.11",
4
+ "description": "My email address is: contact@bugbounty.click - This package was created for ethical hacking purposes only. https://www.microsoft.com/en-us/msrc/bounty If you're reading this, then if I was a malicious hacker then I could have control over your machine. Please see https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610 for the technical description if you are interested. However, please don't report this package to the NPM registry as I have created it for bug bounty purposes. For example, as you can see here the vulnerability has been reported to Hacker1 and been rewarded for (note this is not my report): https://hackerone.com/reports/1104693 If this has broken something then I'm sorry - however, please contact your internal security department/bug bounty administrator and pass on this message and email address. If you leave this on NPM and I receive a callback to my server at https://bugbounty.click then I can prove the vulnerability, and once it is reported it can be fixed before anyone malicious exploits it for bad. I hope I have made myself clear, please report this to your organisational security team. Thank you - bugbounty.click",
5
5
  "main": "index.js",
6
6
  "scripts": {
7
7
  "test": "echo \"Error: no test specified\" && exit 1",