Description
mosc through 1.0.0 is vulnerable to Arbitrary Code Execution. User input provided to `properties` argument is executed by the `eval` function, resulting in code execution.
Remediation
References
https://snyk.io/vuln/SNYK-JS-MOSC-571492
Related Vulnerabilities
CVE-2022-24999 Vulnerability in maven package org.webjars.npm:qs
CVE-2022-36922 Vulnerability in maven package org.jenkins-ci.plugins:lucene-search
CVE-2022-43484 Vulnerability in maven package org.terasoluna.gfw:terasoluna-gfw-common
CVE-2021-43138 Vulnerability in maven package org.webjars.bower:async
CVE-2020-7781 Vulnerability in npm package connection-tester