Логотип exploitDog
bind:CVE-2020-7729
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-7729

Количество 4

Количество 4

ubuntu логотип

CVE-2020-7729

больше 5 лет назад

The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.

CVSS3: 7.1
EPSS: Низкий
nvd логотип

CVE-2020-7729

больше 5 лет назад

The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.

CVSS3: 7.1
EPSS: Низкий
debian логотип

CVE-2020-7729

больше 5 лет назад

The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execut ...

CVSS3: 7.1
EPSS: Низкий
github логотип

GHSA-m5pj-vjjf-4m3h

почти 5 лет назад

Arbitrary Code Execution in grunt

CVSS3: 7.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-7729

The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.

CVSS3: 7.1
4%
Низкий
больше 5 лет назад
nvd логотип
CVE-2020-7729

The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.

CVSS3: 7.1
4%
Низкий
больше 5 лет назад
debian логотип
CVE-2020-7729

The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execut ...

CVSS3: 7.1
4%
Низкий
больше 5 лет назад
github логотип
GHSA-m5pj-vjjf-4m3h

Arbitrary Code Execution in grunt

CVSS3: 7.1
4%
Низкий
почти 5 лет назад

Уязвимостей на страницу