The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published: 2020-09-03T09:00:15.371797Z

Updated: 2024-09-17T01:45:50.965Z

Reserved: 2020-01-21T00:00:00

Link: CVE-2020-7729

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-09-03T09:15:10.360

Modified: 2024-11-21T05:37:41.580

Link: CVE-2020-7729

cve-icon Redhat

No data.