![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2020-7729 |
Description: | The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML. |
Test IDs: | 1.3.6.1.4.1.25623.1.0.844665 1.3.6.1.4.1.25623.1.0.892368 |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2020-7729 https://github.com/gruntjs/grunt/blob/master/lib/grunt/file.js%23L249 https://github.com/gruntjs/grunt/blob/master/lib/grunt/file.js%23L249 https://github.com/gruntjs/grunt/commit/e350cea1724eb3476464561a380fb6a64e61e4e7 https://github.com/gruntjs/grunt/commit/e350cea1724eb3476464561a380fb6a64e61e4e7 https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-607922 https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-607922 https://snyk.io/vuln/SNYK-JS-GRUNT-597546 https://snyk.io/vuln/SNYK-JS-GRUNT-597546 https://lists.debian.org/debian-lts-announce/2020/09/msg00008.html https://usn.ubuntu.com/4595-1/ |