Description
mosc through 1.0.0 is vulnerable to Arbitrary Code Execution. User input provided to `properties` argument is executed by the `eval` function, resulting in code execution.
Remediation
References
https://snyk.io/vuln/SNYK-JS-MOSC-571492
Related Vulnerabilities
CVE-2020-28282 Vulnerability in maven package org.webjars.npm:getobject
CVE-2020-28452 Vulnerability in maven package com.softwaremill.akka-http-session:core_2.11
CVE-2018-3732 Vulnerability in npm package resolve-path
CVE-2023-26104 Vulnerability in npm package lite-web-server
CVE-2023-49375 Vulnerability in maven package com.jfinal:jfinal