Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2020-7729
Description:The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.
Test IDs: 1.3.6.1.4.1.25623.1.0.844665   1.3.6.1.4.1.25623.1.0.892368  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2020-7729
https://github.com/gruntjs/grunt/blob/master/lib/grunt/file.js%23L249
https://github.com/gruntjs/grunt/blob/master/lib/grunt/file.js%23L249
https://github.com/gruntjs/grunt/commit/e350cea1724eb3476464561a380fb6a64e61e4e7
https://github.com/gruntjs/grunt/commit/e350cea1724eb3476464561a380fb6a64e61e4e7
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-607922
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-607922
https://snyk.io/vuln/SNYK-JS-GRUNT-597546
https://snyk.io/vuln/SNYK-JS-GRUNT-597546
https://lists.debian.org/debian-lts-announce/2020/09/msg00008.html
https://usn.ubuntu.com/4595-1/




© 1998-2025 E-Soft Inc. All rights reserved.