Description
mosc through 1.0.0 is vulnerable to Arbitrary Code Execution. User input provided to `properties` argument is executed by the `eval` function, resulting in code execution.
Remediation
References
https://snyk.io/vuln/SNYK-JS-MOSC-571492
Related Vulnerabilities
CVE-2022-0722 Vulnerability in maven package org.webjars.npm:parse-url
CVE-2021-41167 Vulnerability in npm package modern-async
CVE-2018-16487 Vulnerability in npm package lodash.defaultsdeep
CVE-2020-10199 Vulnerability in maven package org.sonatype.nexus:nexus-extdirect
CVE-2021-41084 Vulnerability in maven package org.http4s:http4s-server_3