The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: snyk

Published: 2020-09-03T00:00:00

Updated: 2020-10-26T23:06:11

Reserved: 2020-01-21T00:00:00


Link: CVE-2020-7729

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2020-09-03T09:15:10.360

Modified: 2022-11-16T14:05:18.333


Link: CVE-2020-7729

JSON object: View

cve-icon Redhat Information

No data.

CWE