An issue found in Stoqey gnuplot v.0.0.3 and earlier allows attackers to execute arbitrary code via the src/index.ts, plotCallack, child_process, and/or filePath parameter(s).
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-33360.json"
[ { "events": [ { "introduced": "0" }, { "last_affected": "0.0.3" } ] } ]