Description
mosc through 1.0.0 is vulnerable to Arbitrary Code Execution. User input provided to `properties` argument is executed by the `eval` function, resulting in code execution.
Remediation
References
https://snyk.io/vuln/SNYK-JS-MOSC-571492
Related Vulnerabilities
CVE-2023-34612 Vulnerability in maven package com.helger.commons:ph-json
CVE-2021-21661 Vulnerability in maven package org.jenkins-ci.plugins:kubernetes-cli
CVE-2023-35147 Vulnerability in maven package org.jenkins-ci.plugins:aws-codecommit-trigger
CVE-2022-48216 Vulnerability in npm package @uniswap/universal-router
CVE-2014-3603 Vulnerability in maven package org.opensaml:opensaml