{"id":"GHSA-wh69-wc6q-7888","summary":"Command injection in node-dns-sync","details":"dns-sync through 0.2.0 allows execution of arbitrary commands . This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input.","aliases":["CVE-2020-11079"],"modified":"2026-02-04T02:26:29.880994Z","published":"2020-05-28T18:42:59Z","related":["CVE-2020-11079"],"database_specific":{"nvd_published_at":"2020-05-28T19:15:00Z","github_reviewed_at":"2020-05-28T18:42:31Z","github_reviewed":true,"severity":"HIGH","cwe_ids":["CWE-77","CWE-94"]},"references":[{"type":"WEB","url":"https://github.com/skoranga/node-dns-sync/security/advisories/GHSA-wh69-wc6q-7888"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11079"},{"type":"WEB","url":"https://github.com/skoranga/node-dns-sync/commit/cb10a5ac7913eacc031ade7d91596277f31645dc"},{"type":"PACKAGE","url":"https://github.com/skoranga/node-dns-sync"}],"affected":[{"package":{"name":"dns-sync","ecosystem":"npm","purl":"pkg:npm/dns-sync"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0.1.3"},{"fixed":"0.2.1"}]}],"database_specific":{"source":"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/05/GHSA-wh69-wc6q-7888/GHSA-wh69-wc6q-7888.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"}]}