nodejs is vulnerable to DNS rebinding attacks. The vulnerability exists in the inspector
component allowing an attacker to bypass the DNS rebinding protection if the, said attacker controls the victim’s DNS server or can spoof its responses.
cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
hackerone.com/reports/1069487
lists.fedoraproject.org/archives/list/[email protected]/message/E4FRS5ZVK4ZQ7XIJQNGIKUXG2DJFHLO7/
lists.fedoraproject.org/archives/list/[email protected]/message/F45Y7TXSU33MTKB6AGL2Q5V5ZOCNPKOG/
lists.fedoraproject.org/archives/list/[email protected]/message/HSYFUGKFUSZ27M5TEZ3FKILWTWFJTFAZ/
nodejs.org/en/blog/vulnerability/february-2021-security-releases/
nodejs.org/en/blog/vulnerability/march-2018-security-releases/#node-js-inspector-dns-rebinding-vulnerability-cve-2018-7160
secdb.alpinelinux.org/v3.11/main.yaml
secdb.alpinelinux.org/v3.12/main.yaml
secdb.alpinelinux.org/v3.13/community.yaml
secdb.alpinelinux.org/v3.13/main.yaml
security.netapp.com/advisory/ntap-20210416-0001/
security.netapp.com/advisory/ntap-20210723-0001/
www.oracle.com//security-alerts/cpujul2021.html
www.oracle.com/security-alerts/cpuApr2021.html
www.oracle.com/security-alerts/cpuoct2021.html