### [CVE-2019-10760](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10760) ![](https://img.shields.io/static/v1?label=Product&message=safer-eval&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Arbitrary%20Code%20Execution&color=brighgreen) ### Description safer-eval before 1.3.2 are vulnerable to Arbitrary Code Execution. A payload using constructor properties can escape the sandbox and execute arbitrary code. ### POC #### Reference No PoCs from references. #### Github - https://github.com/lirantal/safer-eval-cve-CVE-2019-10760