2 results (0.007 seconds)

CVSS: 6.8EPSS: 0%CPEs: 2EXPL: 0

28 May 2021 — Singularity is an open source container platform. In verions 3.7.2 and 3.7.3, Dde to incorrect use of a default URL, `singularity` action commands (`run`/`shell`/`exec`) specifying a container using a `library://` URI will always attempt to retrieve the container from the default remote endpoint (`cloud.sylabs.io`) rather than the configured remote endpoint. An attacker may be able to push a malicious container to the default remote endpoint with a URI that is identical to the URI used by a victim with a no... • https://github.com/sylabs/singularity/releases/tag/v3.7.4 • CWE-20: Improper Input Validation CWE-923: Improper Restriction of Communication Channel to Intended Endpoints •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

06 Apr 2021 — Open Container Initiative umoci before 0.4.7 allows attackers to overwrite arbitrary host paths via a crafted image that causes symlink traversal when "umoci unpack" or "umoci raw unpack" is used. Open Container Initiative umoci versiones anteriores a 0.4.7, permite a atacantes sobrescribir rutas de host arbitrarias por medio de una imagen diseñada que causa un salto de enlace simbólico cuando es usado "umoci unpack" o "umoci raw unpack" • http://www.openwall.com/lists/oss-security/2021/04/06/2 • CWE-20: Improper Input Validation •