Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2020-7729

The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.028
EPSS Ranking 85.6%
CVSS Severity
CVSS v3 Score 7.1
CVSS v2 Score 4.6
Products affected by CVE-2020-7729
  • Gruntjs » Grunt » Version: 0.4.0
    cpe:2.3:a:gruntjs:grunt:0.4.0
  • Gruntjs » Grunt » Version: 0.4.1
    cpe:2.3:a:gruntjs:grunt:0.4.1
  • Gruntjs » Grunt » Version: 0.4.2
    cpe:2.3:a:gruntjs:grunt:0.4.2
  • Gruntjs » Grunt » Version: 0.4.3
    cpe:2.3:a:gruntjs:grunt:0.4.3
  • Gruntjs » Grunt » Version: 0.4.4
    cpe:2.3:a:gruntjs:grunt:0.4.4
  • Gruntjs » Grunt » Version: 0.4.5
    cpe:2.3:a:gruntjs:grunt:0.4.5
  • Gruntjs » Grunt » Version: 1.0.0
    cpe:2.3:a:gruntjs:grunt:1.0.0
  • Gruntjs » Grunt » Version: 1.0.1
    cpe:2.3:a:gruntjs:grunt:1.0.1
  • Gruntjs » Grunt » Version: 1.0.2
    cpe:2.3:a:gruntjs:grunt:1.0.2
  • Gruntjs » Grunt » Version: 1.0.3
    cpe:2.3:a:gruntjs:grunt:1.0.3
  • Gruntjs » Grunt » Version: 1.0.4
    cpe:2.3:a:gruntjs:grunt:1.0.4
  • Gruntjs » Grunt » Version: 1.1.0
    cpe:2.3:a:gruntjs:grunt:1.1.0
  • Gruntjs » Grunt » Version: 1.2.0
    cpe:2.3:a:gruntjs:grunt:1.2.0
  • Gruntjs » Grunt » Version: 1.2.1
    cpe:2.3:a:gruntjs:grunt:1.2.1
  • Canonical » Ubuntu Linux » Version: 18.04
    cpe:2.3:o:canonical:ubuntu_linux:18.04
  • Debian » Debian Linux » Version: 9.0
    cpe:2.3:o:debian:debian_linux:9.0


Contact Us

Shodan ® - All rights reserved