The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.
- https://github.com/gruntjs/grunt/commit/e350cea1724eb3476464561a380fb6a64e61e4e7
- https://github.com/404notf0und/CVE-Flow
- https://github.com/ARPSyndicate/cvemon
- https://github.com/HotDB-Community/HotDB-Engine
- https://github.com/Live-Hack-CVE/CVE-2020-7729
- https://github.com/cdcavell/cdcavell.name
- https://github.com/cdcavell/old
- https://github.com/shawnhooper/restful-localized-scripts
- https://github.com/shawnhooper/wpml-rest-api
- https://github.com/tmalbonph/grunt-swagger-tools