CVE-2020-7729

Arbitrary Code Execution

The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.


We have discovered 1 live websites that are affected by CVE-2020-7729.

Run a Free Instant Scan




Affected Software

Product  grunt
Category JavaScript Libraries
Vulnerable Domains1 live websites (100% of grunt install base)
Vulnerable Versions
  • from 0 through 1.3
Vulnerable Versions Count0 versions ( less than 0.1% of all versions)



Details

  • Published - Sep 3, 2020
  • Updated - Sep 17, 2024

Credits

  • Snyk Security Team

Website Distribution by Country

Number of websites using CVE-2020-7729
Canada1 websites

Website Distribution by TLD

Number of websites using CVE-2020-7729
.com1 websites

Websites affected by CVE-2020-7729

Top websites that are affected by CVE-2020-7729. Please click on the "Contact us" link to get more information.
DomainCountryRankContacts
************.com Canada***,***,***
See full domain list

FAQ

A total of 1 websites have been identified as vulnerable to CVE-2020-7729, based on global website indexing conducted by WebTechSurvey.
The grunt is affected by the CVE-2020-7729 vulnerability.
grunt versions up to 1.3 are vulnerable to CVE-2020-7729.
CVE-2020-7729 is resolved in version 1.3 of grunt.