Affected versions of dns-sync
have an arbitrary command execution vulnerability in the resolve()
method.
dns-sync.resolve()
github.com/advisories/GHSA-jcw8-r9xm-32c6
github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d
github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d)))
github.com/skoranga/node-dns-sync/issues/1
github.com/skoranga/node-dns-sync/issues/1)
github.com/skoranga/node-dns-sync/issues/5
nvd.nist.gov/vuln/detail/CVE-2017-16100
www.npmjs.com/advisories/153
www.npmjs.com/advisories/523