CVE-2020-7729
03.09.2020, 09:15
The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.Enginsight
Vendor | Product | Version |
---|---|---|
gruntjs | grunt | 𝑥 < 1.3.0 |
debian | debian_linux | 9.0 |
canonical | ubuntu_linux | 18.04 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References