Feb. 7, 2023, 6:56 p.m. |

Ubuntu security notices ubuntu.com

It was discovered that Grunt was not properly loading YAML files before
parsing them. An attacker could possibly use this issue to execute
arbitrary code. (CVE-2020-7729)

It was discovered that Grunt was not properly handling symbolic links
when performing file copy operations. An attacker could possibly use this
issue to expose sensitive information or execute arbitrary code.
(CVE-2022-0436)

It was discovered that there was a race condition in the Grunt file copy
function, which could lead to an arbitrary file …

code copy cve file files function handling information issue links operations parsing performing race condition sensitive information usn vulnerabilities yaml

Information Security Engineers

@ D. E. Shaw Research | New York City

Senior Cybersecurity Technical Delivery Manager

@ MUFG | London Ropemaker place

Junior consultant-Technology Risk

@ EY | Bratislava, SK, 811 02

Director of Security Engineering, Information Security

@ Illumio | Sunnyvale, California

Cyber Analyst II 03396 NWG

@ North Wind Group | KNOXVILLE, TN

CRIT Information Security Officer (f/m/d)

@ Deutsche Börse | Frankfurt am Main, DE