Attackers are exploiting a major weakness that has allowed them access to the NPM code repository with more than 100 ...