node-dns-sync (npm module dns-sync) through 0.2.0 allows execution of arbitrary commands . This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. This has been fixed in 0.2.1.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-11079.json"
[ { "events": [ { "introduced": "0" }, { "fixed": "0.2.1" } ] }, { "events": [ { "introduced": "0" }, { "last_affected": "0.2.0" } ] } ]