Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsAvoid usage of this package altogether.
ssh-decorate
contained code that collected users' SSH credentials and sent the data to a remote server