The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.
We have discovered 1 live websites that are affected by CVE-2020-7729.
| Product | |
| Category | JavaScript Libraries |
| Vulnerable Domains | 1 live websites (100% of grunt install base) |
| Vulnerable Versions |
|
| Vulnerable Versions Count | 0 versions ( less than 0.1% of all versions) |
| 1 websites |
| .com | 1 websites |
| Domain | Country | Rank | Contacts |
|---|---|---|---|
| ************.com | ***,***,*** |
FAQ