Количество 4
Количество 4
CVE-2020-7729
The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.
CVE-2020-7729
The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.
CVE-2020-7729
The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execut ...
GHSA-m5pj-vjjf-4m3h
Arbitrary Code Execution in grunt
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2020-7729 The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML. | CVSS3: 7.1 | 4% Низкий | больше 5 лет назад | |
CVE-2020-7729 The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML. | CVSS3: 7.1 | 4% Низкий | больше 5 лет назад | |
CVE-2020-7729 The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execut ... | CVSS3: 7.1 | 4% Низкий | больше 5 лет назад | |
GHSA-m5pj-vjjf-4m3h Arbitrary Code Execution in grunt | CVSS3: 7.1 | 4% Низкий | почти 5 лет назад |
Уязвимостей на страницу