Control: tags -1 + confirmed

On Sun, 2020-09-06 at 23:50 +0200, Xavier Guimard wrote:
> grunt is vulnerable to a medium CVE (CVE-2020-7729, #969668)
> 
> [ Impact ]
> The package grunt before 1.3.0 are vulnerable to Arbitrary Code
> Execution due to the default usage of the function load() instead of
> its secure replacement safeLoad() of the package js-yaml inside
> grunt.file.readYAML.

Please go ahead.

Regards,

Adam

Reply via email to