mosc through 1.0.0 is vulnerable to Arbitrary Code Execution. User input provided to properties
argument is executed by the eval
function, resulting in code execution.
[
{
"product": "mosc",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "All versions including 1.0.0"
}
]
}
]