CVE-2020-7729
03.09.2020, 09:15
The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.Enginsight
| Vendor | Product | Version |
|---|---|---|
| gruntjs | grunt | 𝑥 < 1.3.0 |
| debian | debian_linux | 9.0 |
| canonical | ubuntu_linux | 18.04 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Common Weakness Enumeration
References