Vulnerabilities > Sylabs > Singularity > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-04-25 | CVE-2023-30549 | Apptainer is an open source container platform for Linux. | 7.8 |
2020-09-16 | CVE-2020-25040 | Exposure of Resource to Wrong Sphere vulnerability in multiple products Sylabs Singularity through 3.6.2 has Insecure Permissions on temporary directories used in explicit and implicit container build operations, a different vulnerability than CVE-2020-25039. | 8.8 |
2020-09-16 | CVE-2020-25039 | Exposure of Resource to Wrong Sphere vulnerability in multiple products Sylabs Singularity 3.2.0 through 3.6.2 has Insecure Permissions on temporary directories used in fakeroot or user namespace container execution. | 8.1 |
2020-07-14 | CVE-2020-13847 | Improper Validation of Integrity Check Value vulnerability in Sylabs Singularity Sylabs Singularity 3.0 through 3.5 lacks support for an Integrity Check. | 7.5 |
2020-07-14 | CVE-2020-13846 | Unspecified vulnerability in Sylabs Singularity Sylabs Singularity 3.5.0 through 3.5.3 fails to report an error in a Status Code. | 7.5 |
2020-07-14 | CVE-2020-13845 | Improper Validation of Integrity Check Value vulnerability in Sylabs Singularity Sylabs Singularity 3.0 through 3.5 has Improper Validation of an Integrity Check Value. | 7.5 |
2019-12-18 | CVE-2019-19724 | Incorrect Default Permissions vulnerability in Sylabs Singularity Insecure permissions (777) are set on $HOME/.singularity when it is newly created by Singularity (version from 3.3.0 to 3.5.1), which could lead to an information leak, and malicious redirection of operations performed against Sylabs cloud services. | 7.5 |
2019-05-14 | CVE-2019-11328 | Incorrect Permission Assignment for Critical Resource vulnerability in multiple products An issue was discovered in Singularity 3.1.0 to 3.2.0-rc2, a malicious user with local/network access to the host system (e.g. | 8.8 |
2018-12-17 | CVE-2018-19295 | Improper Input Validation vulnerability in Sylabs Singularity Sylabs Singularity 2.4 to 2.6 allows local users to conduct Improper Input Validation attacks. | 7.8 |