Lookup for vulnerable packages by Package URL.

GET /api/packages/939435?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/939435?format=api",
    "purl": "pkg:deb/debian/singularity-container@4.1.5%2Bds4-1?distro=sid",
    "type": "deb",
    "namespace": "debian",
    "name": "singularity-container",
    "version": "4.1.5+ds4-1",
    "qualifiers": {
        "distro": "sid"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36812?format=api",
            "vulnerability_id": "VCID-5ftw-539a-kbdz",
            "summary": "\"Verify All\" Returns Success Despite Validation Failures in Singularity\n### Impact\n\nThe `--all / -a` option to `singularity verify` returns success even when some objects in a SIF container are not signed, or cannot be verified.\n\nThe SIF objects that are not verified are reported in `WARNING` log messages, but a `Container Verified` message and exit code of `0`  are returned.\n\nWorkflows that verify a container using `--all / -a` and use the exit code as an indicator of success are vulnerable to running SIF containers that have unsigned, or modified, objects that may be exploited to introduce malicious behavior.\n\n```\n$ singularity verify -a image.sif \nWARNING: Missing signature for SIF descriptor 2 (JSON.Generic)\nWARNING: Missing signature for SIF descriptor 3 (FS)\nContainer is signed by 1 key(s):\n\nVerifying partition: Def.FILE:\n12045C8C0B1004D058DE4BEDA20C27EE7FF7BA84\n[LOCAL]   Unit Test <unit@test.com>\n[OK]      Data integrity verified\n\nINFO:    Container verified: image.sif\n\n$ echo $?\n0\n```\n\n\n### Patches\n\nSingularity 3.6.0 has a new implementation of sign/verify that fixes this issue.\n\nAll users are advised to upgrade to 3.6.0. Note that Singularity 3.6.0 uses a new signature format that is necessarily incompatible with Singularity < 3.6.0 - e.g. Singularity 3.5.3 cannot verify containers signed by 3.6.0.\n\nVersion 3.6.0 includes a `--legacy-insecure` flag for the `singularity verify` command, that will perform verification of the older, and insecure, legacy signatures for compatibility with existing containers. This does not guarantee that containers have not been modified since signing, due to other issues in the legacy signature format.\n\n### Workarounds\n\nIf you are unable to update to 3.6.0 ensure that you do not rely on the return code of `singularity verify --all / -a` as an indicator of trust in a container.\n\nNote that other issues in the sign/verify implementation in Singularity < 3.6.0 allow additional means to introduce malicious behavior to a signed container.\n\n\n### For more information\n\nGeneral questions about the impact of the advisory / changes made in the 3.6.0 release can be asked in the:\n\n* [Singularity Slack Channel](https://bit.ly/2m0g3lX)\n* [Singularity Mailing List](https://groups.google.com/a/lbl.gov/forum/??sdf%7Csort:date#!forum/singularity)\n\nAny sensitive security concerns should be directed to: security@sylabs.io\n\nSee our Security Policy here: https://sylabs.io/security-policy",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00046.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00046.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00053.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00053.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-13846",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58869",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58778",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58746",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58761",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58713",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58757",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58815",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58771",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58798",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58651",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58735",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58756",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58723",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58776",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58783",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58801",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58763",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58795",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.588",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-13846"
                },
                {
                    "reference_url": "https://github.com/hpcng/singularity/security/advisories/GHSA-6w7g-p4jh-rf92",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/hpcng/singularity/security/advisories/GHSA-6w7g-p4jh-rf92"
                },
                {
                    "reference_url": "https://github.com/sylabs/singularity",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sylabs/singularity"
                },
                {
                    "reference_url": "https://medium.com/sylabs",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://medium.com/sylabs"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13846",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13846"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965040",
                    "reference_id": "965040",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965040"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939441?format=api",
                    "purl": "pkg:deb/debian/singularity-container@3.9.5%2Bds1-2?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@3.9.5%252Bds1-2%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939435?format=api",
                    "purl": "pkg:deb/debian/singularity-container@4.1.5%2Bds4-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@4.1.5%252Bds4-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-13846",
                "GHSA-6w7g-p4jh-rf92"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5ftw-539a-kbdz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82686?format=api",
            "vulnerability_id": "VCID-68f5-9mbb-syf5",
            "summary": "kubernetes: Incorrect rule injection in CNI portmap plugin",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHBA-2019:0862",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHBA-2019:0862"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9946.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9946.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67707",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67956",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67905",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67874",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67899",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6774",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6776",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67741",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67792",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67806",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6783",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67816",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67782",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67818",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67831",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67812",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67832",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67841",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67847",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67822",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67865",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9946"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/containernetworking/plugins/pull/269#issuecomment-477683272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/containernetworking/plugins/pull/269#issuecomment-477683272"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FCN66VYB3XS76SYH567SO7N3I254JOCT/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FCN66VYB3XS76SYH567SO7N3I254JOCT/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGOOWAELGH3F7OXRBPH3HCNZELNLXYTW/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGOOWAELGH3F7OXRBPH3HCNZELNLXYTW/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20190416-0002/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20190416-0002/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1692712",
                    "reference_id": "1692712",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1692712"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cncf:portmap:*:*:*:*:*:container_networking_interface:*:*",
                    "reference_id": "cpe:2.3:a:cncf:portmap:*:*:*:*:*:container_networking_interface:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cncf:portmap:*:*:*:*:*:container_networking_interface:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kubernetes:kubernetes:1.13.6:beta0:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:kubernetes:kubernetes:1.13.6:beta0:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kubernetes:kubernetes:1.13.6:beta0:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha0:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha0:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha0:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha3:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha3:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha3:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kubernetes:kubernetes:1.14.0:beta0:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:kubernetes:kubernetes:1.14.0:beta0:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kubernetes:kubernetes:1.14.0:beta0:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kubernetes:kubernetes:1.14.0:beta1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:kubernetes:kubernetes:1.14.0:beta1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kubernetes:kubernetes:1.14.0:beta1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kubernetes:kubernetes:1.14.0:beta2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:kubernetes:kubernetes:1.14.0:beta2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kubernetes:kubernetes:1.14.0:beta2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kubernetes:kubernetes:1.14.0:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:kubernetes:kubernetes:1.14.0:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kubernetes:kubernetes:1.14.0:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_insights:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:cloud_insights:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_insights:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9946",
                    "reference_id": "CVE-2019-9946",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9946"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:3403",
                    "reference_id": "RHSA-2019:3403",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:3403"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939438?format=api",
                    "purl": "pkg:deb/debian/singularity-container@3.5.0%2Bds1-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@3.5.0%252Bds1-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939435?format=api",
                    "purl": "pkg:deb/debian/singularity-container@4.1.5%2Bds4-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@4.1.5%252Bds4-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2019-9946"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-68f5-9mbb-syf5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54642?format=api",
            "vulnerability_id": "VCID-92et-9aat-qkgf",
            "summary": "Singularity insecure permissions\nInsecure permissions (777) are set on `$HOME/.singularity` when it is newly created by Singularity (version from 3.3.0 to 3.5.1), which could lead to an information leak, and malicious redirection of operations performed against Sylabs cloud services.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00025.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00025.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19724",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00313",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54554",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00313",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54498",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00313",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54459",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00313",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54475",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00313",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54453",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00313",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54404",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00313",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54446",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00313",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54502",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00313",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54487",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00313",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54391",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00313",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54469",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00313",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54492",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00313",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5446",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00313",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54512",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00313",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54506",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00313",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54518",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00313",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54501",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00313",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54479",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00313",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5452",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19724"
                },
                {
                    "reference_url": "https://github.com/sylabs/singularity",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sylabs/singularity"
                },
                {
                    "reference_url": "https://github.com/sylabs/singularity/commit/2cda4981812c29f0fb11d3ea6aaf6139f665a631",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sylabs/singularity/commit/2cda4981812c29f0fb11d3ea6aaf6139f665a631"
                },
                {
                    "reference_url": "https://github.com/sylabs/singularity/releases/tag/v3.5.2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sylabs/singularity/releases/tag/v3.5.2"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19724",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19724"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939440?format=api",
                    "purl": "pkg:deb/debian/singularity-container@3.5.2%2Bds1-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@3.5.2%252Bds1-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939435?format=api",
                    "purl": "pkg:deb/debian/singularity-container@4.1.5%2Bds4-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@4.1.5%252Bds4-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2019-19724",
                "GHSA-mj73-5x75-9phh"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-92et-9aat-qkgf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36563?format=api",
            "vulnerability_id": "VCID-96qz-zbn5-n3ar",
            "summary": "Incorrect Permission Assignment for Critical Resource in Singularity\nAn issue was discovered in Singularity 3.1.0 to 3.2.0-rc2, a malicious user with local/network access to the host system (e.g. ssh) could exploit this vulnerability due to insecure permissions allowing a user to edit files within `/run/singularity/instances/sing/<user>/<instance>`. The manipulation of those files can change the behavior of the starter-suid program when instances are joined resulting in potential privilege escalation on the host.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00028.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00028.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11328",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00606",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6977",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00606",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69739",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00606",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69695",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00606",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6972",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00606",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69665",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00606",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69707",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00606",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69655",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00606",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69674",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00606",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69715",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00606",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69816",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00606",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69766",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00606",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6974",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00824",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74454",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00824",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74398",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00824",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74402",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00824",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74429",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00824",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74404",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00824",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74437",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00824",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74476",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00824",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74457",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00824",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74447",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11328"
                },
                {
                    "reference_url": "https://github.com/sylabs/singularity/commit/618c9d56802399adb329c23ea2b70598eaff4a31",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sylabs/singularity/commit/618c9d56802399adb329c23ea2b70598eaff4a31"
                },
                {
                    "reference_url": "https://github.com/sylabs/singularity/releases/tag/v3.2.0",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sylabs/singularity/releases/tag/v3.2.0"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5O3TPL5OOTIZEI4H6IQBCCISBARJ6WL3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5O3TPL5OOTIZEI4H6IQBCCISBARJ6WL3"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LIHV7DSEVTB5SUPEZ2UXGS3Q6WMEQSO2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LIHV7DSEVTB5SUPEZ2UXGS3Q6WMEQSO2"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNU5BUHFOTYUZVHFUSX2VG4S3RCPUEMA",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNU5BUHFOTYUZVHFUSX2VG4S3RCPUEMA"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11328",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11328"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2019/05/16/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2019/05/16/1"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/108360",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/108360"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939439?format=api",
                    "purl": "pkg:deb/debian/singularity-container@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939435?format=api",
                    "purl": "pkg:deb/debian/singularity-container@4.1.5%2Bds4-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@4.1.5%252Bds4-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2019-11328",
                "GHSA-557g-r22w-9wvx"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-96qz-zbn5-n3ar"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36383?format=api",
            "vulnerability_id": "VCID-a2rx-fr2c-vqej",
            "summary": "Insecure permissions on user namespace / fakeroot temporary rootfs in Singularity\n### Impact\n\nInsecure permissions on temporary directories used in fakeroot or user namespace container execution.\n\nWhen a Singularity action command (run, shell, exec) is run with the fakeroot or user namespace option, Singularity will extract a container image to a temporary sandbox directory. Due to insecure permissions on the temporary directory it is possible for any user with access to the system to read the contents of the image. Additionally, if the image contains a world-writable file or directory, it is possible for a user to inject arbitrary content into the running container.\n\n### Patches\n\nThis issue is addressed in Singularity 3.6.3.\n\nAll users are advised to upgrade to 3.6.3.\n\n### Workarounds\n\nThe issue is mitigated if `TMPDIR` is set to a location that is only accessible to the user, as any subdirectories directly under `TMPDIR` cannot then be accessed by others. However, this is difficult to enforce so it is not recommended to rely on this as a mitigation.\n\n### For more information\n\nGeneral questions about the impact of the advisory / changes made in the 3.6.0 release can be asked in the:\n\n* [Singularity Slack Channel](https://bit.ly/2m0g3lX)\n* [Singularity Mailing List](https://groups.google.com/a/lbl.gov/forum/??sdf%7Csort:date#!forum/singularity)\n\nAny sensitive security concerns should be directed to: security@sylabs.io\n\nSee our Security Policy here: https://sylabs.io/security-policy",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00070.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00070.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00088.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00088.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25039",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7446",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74366",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74364",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74362",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74391",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74416",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74382",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74404",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74239",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74244",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74271",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74276",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74291",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74312",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74293",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74285",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74322",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74332",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74324",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74357",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25039"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/hpcng/singularity/security/advisories/GHSA-w6v2-qchm-grj7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/hpcng/singularity/security/advisories/GHSA-w6v2-qchm-grj7"
                },
                {
                    "reference_url": "https://medium.com/sylabs",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://medium.com/sylabs"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25039",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25039"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970465",
                    "reference_id": "970465",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970465"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939441?format=api",
                    "purl": "pkg:deb/debian/singularity-container@3.9.5%2Bds1-2?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@3.9.5%252Bds1-2%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939435?format=api",
                    "purl": "pkg:deb/debian/singularity-container@4.1.5%2Bds4-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@4.1.5%252Bds4-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-25039",
                "GHSA-w6v2-qchm-grj7"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a2rx-fr2c-vqej"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/53059?format=api",
            "vulnerability_id": "VCID-at1e-t3kt-17bg",
            "summary": "containers/image library Insufficiently Protects Credentials\nThe containers/image library used by the container tools Podman, Buildah, and Skopeo in Red Hat Enterprise Linux version 8 and CRI-O in OpenShift Container Platform, does not enforce TLS connections to the container registry authorization service. An attacker could use this vulnerability to launch a MiTM attack and steal login credentials or bearer tokens.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00035.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00035.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10214.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10214.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10214",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61354",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61306",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61402",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.0041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61458",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.0041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61375",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.0041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61413",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64751",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64609",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64661",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64689",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64648",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64696",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64711",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64728",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64716",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64688",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64724",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64736",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64722",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64742",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64755",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10214"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732508",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732508"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10214",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10214"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/containers/image",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/image"
                },
                {
                    "reference_url": "https://github.com/containers/image/commit/634605d06e738aec8332bcfd69162e7509ac7aaf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/image/commit/634605d06e738aec8332bcfd69162e7509ac7aaf"
                },
                {
                    "reference_url": "https://github.com/containers/image/issues/654",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/image/issues/654"
                },
                {
                    "reference_url": "https://github.com/containers/image/pull/655",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/image/pull/655"
                },
                {
                    "reference_url": "https://github.com/containers/image/pull/669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/image/pull/669"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10214",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10214"
                },
                {
                    "reference_url": "https://pkg.go.dev/vuln/GO-2021-0081",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://pkg.go.dev/vuln/GO-2021-0081"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:buildah_project:buildah:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:buildah_project:buildah:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:buildah_project:buildah:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpod_project:libpod:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libpod_project:libpod:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpod_project:libpod:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:skopeo_project:skopeo:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:skopeo_project:skopeo:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:skopeo_project:skopeo:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:2817",
                    "reference_id": "RHSA-2019:2817",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:2817"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:2825",
                    "reference_id": "RHSA-2019:2825",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:2825"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:2989",
                    "reference_id": "RHSA-2019:2989",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:2989"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:3007",
                    "reference_id": "RHSA-2019:3007",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:3007"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:3403",
                    "reference_id": "RHSA-2019:3403",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:3403"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:3494",
                    "reference_id": "RHSA-2019:3494",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:3494"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:3812",
                    "reference_id": "RHSA-2019:3812",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:3812"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939438?format=api",
                    "purl": "pkg:deb/debian/singularity-container@3.5.0%2Bds1-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@3.5.0%252Bds1-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939435?format=api",
                    "purl": "pkg:deb/debian/singularity-container@4.1.5%2Bds4-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@4.1.5%252Bds4-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2019-10214",
                "GHSA-85p9-j7c9-v4gr"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-at1e-t3kt-17bg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/30690?format=api",
            "vulnerability_id": "VCID-b1v9-q2r1-gfcf",
            "summary": "scs-library-client may leak user credentials to third-party service via HTTP redirect\n### Impact\n\nWhen the scs-library-client is used to pull a container image, with authentication, the HTTP Authorization header sent by the client to the library service may be incorrectly leaked to an S3 backing storage provider. This occurs in a specific flow, where the library service redirects the client to a backing S3 storage server, to perform a multi-part concurrent download.\n\nDepending on site configuration, the S3 service may be provided by a third party. An attacker with access to the S3 service may be able to extract user credentials, allowing them to impersonate the user.\n\nThe vulnerable multi-part concurrent download flow, with redirect to S3, is only used when communicating with a Singularity Enterprise 1.x installation, or third party server implementing this flow.\n\nInteraction with Singularity Enterprise 2.x, and Singularity Container Services (cloud.sylabs.io), does not trigger the vulnerable flow.\n\nWe encourage all users to update. Users who interact with a Singularity Enterprise 1.x installation, using a 3rd party S3 storage service, are advised to revoke and recreate their authentication tokens within Singularity Enterprise.\n\n### Patches\n\nThe security issue was identified after the integration of a bug-fix commit 68ac4ca into the previously released scs-library-client 1.3.4. This commit fixes the security issue in the 1.3 series.\n\nscs-library-client 1.4.2 contains a fix for the same vulnerability in the 1.4 series, as commit eebd7ca.\n\n### Workarounds\n\nThere is no workaround available at this time.\n\nAs above, access to Singularity Enterprise 2.x, or Singularity Container Services (cloud.sylabs.io), does not trigger the vulnerable flow.\n\n### References\n\nhttps://cwe.mitre.org/data/definitions/522.html",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5852",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58639",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58568",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5854",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58585",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58527",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58483",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58518",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58532",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59336",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59312",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.593",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59351",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59363",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59383",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59366",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59348",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5938",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59387",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59367",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23538"
                },
                {
                    "reference_url": "https://github.com/sylabs/scs-library-client",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sylabs/scs-library-client"
                },
                {
                    "reference_url": "https://github.com/sylabs/scs-library-client/commit/68ac4cab5cda0afd8758ff5b5e2e57be6a22fcfa",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T20:59:54Z/"
                        }
                    ],
                    "url": "https://github.com/sylabs/scs-library-client/commit/68ac4cab5cda0afd8758ff5b5e2e57be6a22fcfa"
                },
                {
                    "reference_url": "https://github.com/sylabs/scs-library-client/commit/b5db2aacba6bf1231f42dd475cc32e6355ab47b2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T20:59:54Z/"
                        }
                    ],
                    "url": "https://github.com/sylabs/scs-library-client/commit/b5db2aacba6bf1231f42dd475cc32e6355ab47b2"
                },
                {
                    "reference_url": "https://github.com/sylabs/scs-library-client/commit/eebd7caaab310b1fa803e55b8fc1acd9dcd2d00c",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T20:59:54Z/"
                        }
                    ],
                    "url": "https://github.com/sylabs/scs-library-client/commit/eebd7caaab310b1fa803e55b8fc1acd9dcd2d00c"
                },
                {
                    "reference_url": "https://github.com/sylabs/scs-library-client/security/advisories/GHSA-7p8m-22h4-9pj7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T20:59:54Z/"
                        }
                    ],
                    "url": "https://github.com/sylabs/scs-library-client/security/advisories/GHSA-7p8m-22h4-9pj7"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23538"
                },
                {
                    "reference_url": "https://pkg.go.dev/vuln/GO-2023-1497",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://pkg.go.dev/vuln/GO-2023-1497"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939442?format=api",
                    "purl": "pkg:deb/debian/singularity-container@3.11.0%2Bds1-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@3.11.0%252Bds1-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939435?format=api",
                    "purl": "pkg:deb/debian/singularity-container@4.1.5%2Bds4-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@4.1.5%252Bds4-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2022-23538",
                "GHSA-7p8m-22h4-9pj7"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b1v9-q2r1-gfcf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57348?format=api",
            "vulnerability_id": "VCID-b2wt-5jwr-d7g7",
            "summary": "Singularity Incorrect Access Control\nSingularity 2.3.0 through 2.5.1 is affected by an incorrect access control on systems supporting overlay file system. When using the overlay option, a malicious user may access sensitive information by exploiting a few specific Singularity features.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12021",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00427",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62527",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00427",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62385",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00427",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6243",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00427",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62437",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00427",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62421",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00427",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62432",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00427",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62448",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00427",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62444",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00427",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62389",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00427",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62495",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00427",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62474",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00427",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62277",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00427",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62334",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00427",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62365",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00427",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62331",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00427",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62381",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00427",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62398",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00427",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62417",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00427",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62407",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12021"
                },
                {
                    "reference_url": "https://github.com/singularityware/singularity",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/singularityware/singularity"
                },
                {
                    "reference_url": "https://github.com/singularityware/singularity/releases/tag/2.5.2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/singularityware/singularity/releases/tag/2.5.2"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12021",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:C/I:N/A:N"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12021"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2019/05/16/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2019/05/16/1"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sylabs:singularity:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:sylabs:singularity:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sylabs:singularity:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/USN-4840-1/",
                    "reference_id": "USN-USN-4840-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/USN-4840-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939436?format=api",
                    "purl": "pkg:deb/debian/singularity-container@2.5.2-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@2.5.2-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939435?format=api",
                    "purl": "pkg:deb/debian/singularity-container@4.1.5%2Bds4-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@4.1.5%252Bds4-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2018-12021",
                "GHSA-4x32-h296-rg6j"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b2wt-5jwr-d7g7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46648?format=api",
            "vulnerability_id": "VCID-cjnx-2wm2-yyhg",
            "summary": "Insecure permissions on build temporary rootfs in Singularity\n### Impact\n\nInsecure permissions on temporary directories used in explicit and implicit container build operations.\n\nWhen a Singularity command that results in a container build operation is executed, it is possible for a user with access to the system to read the contents of the image during the build. Additionally, if the image contains a world-writable file or directory, it is possible for a user to inject arbitrary content into the running build, which in certain circumstances may enable arbitrary code execution during the build and/or when the built container is run.\n\n### Patches\n\nThis issue is addressed in Singularity 3.6.3.\n\nAll users are advised to upgrade to 3.6.3.\n\n### Workarounds\n\nThe issue is mitigated if `TMPDIR` is set to a location that is only accessible to the user, as any subdirectories directly under `TMPDIR` cannot then be accessed by others. However, this is difficult to enforce so it is not recommended to rely on this as a mitigation.\n\n### For more information\n\nGeneral questions about the impact of the advisory / changes made in the 3.6.0 release can be asked in the:\n\n* [Singularity Slack Channel](https://bit.ly/2m0g3lX)\n* [Singularity Mailing List](https://groups.google.com/a/lbl.gov/forum/??sdf%7Csort:date#!forum/singularity)\n\nAny sensitive security concerns should be directed to: security@sylabs.io\n\nSee our Security Policy here: https://sylabs.io/security-policy",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00070.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00070.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00088.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00088.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25040",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73189",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7311",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73107",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73101",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73129",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7315",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73111",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73134",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72958",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72971",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72991",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72967",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73004",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73018",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73043",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73022",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73015",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73058",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73067",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7306",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73099",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25040"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/hpcng/singularity/security/advisories/GHSA-jv9c-w74q-6762",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/hpcng/singularity/security/advisories/GHSA-jv9c-w74q-6762"
                },
                {
                    "reference_url": "https://medium.com/sylabs",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://medium.com/sylabs"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25040",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25040"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970465",
                    "reference_id": "970465",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970465"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939441?format=api",
                    "purl": "pkg:deb/debian/singularity-container@3.9.5%2Bds1-2?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@3.9.5%252Bds1-2%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939435?format=api",
                    "purl": "pkg:deb/debian/singularity-container@4.1.5%2Bds4-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@4.1.5%252Bds4-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-25040",
                "GHSA-jv9c-w74q-6762"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cjnx-2wm2-yyhg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/30535?format=api",
            "vulnerability_id": "VCID-g1xe-smzd-pyfb",
            "summary": "Unpatched extfs vulnerabilities are exploitable through suid-mode Apptainer\n### Impact\nThere is an ext4 use-after-free flaw described in CVE-2022-1184 that is exploitable through versions of Apptainer < 1.1.0 and installations that include apptainer-suid < 1.1.8 on older operating systems where that CVE has not been patched.  That includes Red Hat Enterprise Linux 7, Debian 10 buster (unless the linux-5.10 package is installed), Ubuntu 18.04 bionic and Ubuntu 20.04 focal.  Use-after-free flaws in the kernel can be used to attack the kernel for denial of service and potentially for privilege escalation.\n\n### Background\nHistorically there have been many CVEs published for extfs and a smaller number for squashfs, including serious use-after-free and buffer overrun vulnerabilities, that are scored as \"Moderate\" or \"Low\" impact only because unprivileged users were assumed to not have write access to the raw data.  Because of those ratings, vendors treat such CVEs as low urgency and either delay a patch until their next major release or never patch older but still supported operating systems at all.  Many Linux distributions automatically mount user-writable USB-drive volumes, but those are considered low risk because they require physical access to the machine.  However, since setuid-root installations of Apptainer by default allow all users to mount any extfs (specifically, ext3, which is implemented by the ext4 driver) and squashfs filesystem using kernel drivers even though the users have write access to the raw data, the setuid-root installations raise the severity of such unpatched CVEs.  \n\nCVE-2022-1184 is currently such an unpatched CVE, at least on the above listed operating systems.  The descriptions from the operating system vendors about the CVE (referenced below) are incomplete, saying only that it allows a local attacker with user privilege to cause a denial of service.  Normally users would not be able to cause it because they cannot modify the filesystem image, and normally vulnerabilities that involve kernel memory corruption by unprivileged users are considered high severity even when there is not yet a known privilege escalation because someone with sufficient kernel knowledge can usually turn such a corruption into a privilege escalation. \n\nRed Hat did not list RHEL7 as vulnerable, but they also did not list it as unaffected, and testing confirmed that a filesystem image could be corrupted to get past the check inserted into the filesystem driver to fix the vulnerability (patches linked below).\n\nAll published squashfs CVEs have been patched in currently supported major operating systems.\n\n### Patches\nApptainer 1.1.8 includes a patch that by default disables mounting of extfs filesystem types in setuid-root mode, while continuing to allow mounting of extfs filesystems in non-setuid \"rootless\" mode using fuse2fs.\n\n### Workarounds\nThese workarounds are possible:\n1. Either do not install apptainer-suid (for versions 1.1.0 through 1.1.7) or set `allow setuid = no` in apptainer.conf.  This requires having unprivileged user namespaces enabled and except for apptainer 1.1.x versions will disallow mounting of sif files, extfs files, and squashfs files in addition to other, less significant impacts.  (Encrypted sif files are also not supported unprivileged in apptainer 1.1.x.)\n2. Alternatively, use the `limit containers` options in apptainer.conf/singularity.conf to limit sif files to trusted users, groups, and/or paths.  (The option `allow container extfs = no` disallows mounting extfs overlay files but does not disallow mounting of extfs overlay partitions inside SIF files, so it does not help work around the problem.)\n\n### References\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-1184\nhttps://access.redhat.com/security/cve/cve-2022-1184\nhttps://security-tracker.debian.org/tracker/CVE-2022-1184\nhttps://ubuntu.com/security/CVE-2022-1184\nKernel patches for CVE-2022-1184:\nhttps://github.com/torvalds/linux/commit/65f8ea4cd57dbd46ea13b41dc8bac03176b04233\nhttps://github.com/torvalds/linux/commit/61a1d87a324ad5e3ed27c6699dfc93218fcf3201\n\n------\n\n## Addendum 30 May 2023\n\nNew information has become available: many ext4 filesytem vulnerabilities similar to the one in CVE-2022-1184 continue to be found, and most of them do not ever have a CVE assigned.  The way to locate them is to search for \"syzbot\" in linux kernel commit messages under fs/ext4.  \"syzbot\" is a public automated system for finding kernel bugs.  Especially when syzbot reports are labeled \"KASAN\" (Kernel Address Sanitizer) and especially if they involve memory corruption including \"use after free\", \"out of bounds\", or \"user-memory-access\", they are vulnerabilities that can potentially be turned into privilege escalation when an unprivileged user has write access to the underlying data.\n\nIn particular there are two such commits from this month, May 2023, referenced below.  They both have commit messages describing a situation of write access to the underlying data while the kernel has that data mounted as a filesystem.  These commits have been backported to currently maintained kernel lines in versions 4.19.293 and 5.4.243, but since they are considered moderate severity, most common OS distributions do not include them immediately.  For example since RHEL9.2 was recently announced, they are not likely to be available in RHEL9 until 9.3 is released in about another 6 months.  Therefore if system administrators want to be protected against these vulnerabilities while still allowing ext4 filesystem mounts through setuid-root apptainer, they should watch for these types of commits and whenever such commits are released the administrators should update to the latest currently maintained kernel version (bypassing their OS vendor's distribution) and reboot.\n\nhttps://github.com/torvalds/linux/commit/2220eaf90992c11d888fe771055d4de3303\nhttps://github.com/torvalds/linux/commit/4f04351888a83e595571de672e0a4a8b74f\nhttps://lwn.net/Articles/932137/\nhttps://lwn.net/Articles/932136/",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/security/cve/cve-2022-1184",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T18:37:22Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/cve-2022-1184"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-30549",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07411",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07246",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07274",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07267",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07179",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07181",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07186",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07257",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07268",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07281",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07286",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07258",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07203",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07223",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07308",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07482",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07465",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07483",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.0003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0885",
                            "published_at": "2026-05-14T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-30549"
                },
                {
                    "reference_url": "https://github.com/apptainer/apptainer",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apptainer/apptainer"
                },
                {
                    "reference_url": "https://github.com/apptainer/apptainer/commit/5a4964f5ba9c8d89a0e353b97f51fd607670a9f7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T18:37:22Z/"
                        }
                    ],
                    "url": "https://github.com/apptainer/apptainer/commit/5a4964f5ba9c8d89a0e353b97f51fd607670a9f7"
                },
                {
                    "reference_url": "https://github.com/apptainer/apptainer/releases/tag/v1.1.8",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T18:37:22Z/"
                        }
                    ],
                    "url": "https://github.com/apptainer/apptainer/releases/tag/v1.1.8"
                },
                {
                    "reference_url": "https://github.com/apptainer/apptainer/security/advisories/GHSA-j4rf-7357-f4cg",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T18:37:22Z/"
                        }
                    ],
                    "url": "https://github.com/apptainer/apptainer/security/advisories/GHSA-j4rf-7357-f4cg"
                },
                {
                    "reference_url": "https://github.com/torvalds/linux/commit/2220eaf90992c11d888fe771055d4de3303",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T18:37:22Z/"
                        }
                    ],
                    "url": "https://github.com/torvalds/linux/commit/2220eaf90992c11d888fe771055d4de3303"
                },
                {
                    "reference_url": "https://github.com/torvalds/linux/commit/4f04351888a83e595571de672e0a4a8b74f",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T18:37:22Z/"
                        }
                    ],
                    "url": "https://github.com/torvalds/linux/commit/4f04351888a83e595571de672e0a4a8b74f"
                },
                {
                    "reference_url": "https://github.com/torvalds/linux/commit/61a1d87a324ad5e3ed27c6699dfc93218fcf3201",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/torvalds/linux/commit/61a1d87a324ad5e3ed27c6699dfc93218fcf3201"
                },
                {
                    "reference_url": "https://github.com/torvalds/linux/commit/65f8ea4cd57dbd46ea13b41dc8bac03176b04233",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/torvalds/linux/commit/65f8ea4cd57dbd46ea13b41dc8bac03176b04233"
                },
                {
                    "reference_url": "https://lwn.net/Articles/932136",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lwn.net/Articles/932136"
                },
                {
                    "reference_url": "https://lwn.net/Articles/932137",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lwn.net/Articles/932137"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1184",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1184"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30549",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30549"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202311-13",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T18:37:22Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202311-13"
                },
                {
                    "reference_url": "https://security-tracker.debian.org/tracker/CVE-2022-1184",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T18:37:22Z/"
                        }
                    ],
                    "url": "https://security-tracker.debian.org/tracker/CVE-2022-1184"
                },
                {
                    "reference_url": "https://sylabs.io/2023/04/response-to-cve-2023-30549",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://sylabs.io/2023/04/response-to-cve-2023-30549"
                },
                {
                    "reference_url": "https://ubuntu.com/security/CVE-2022-1184",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T18:37:22Z/"
                        }
                    ],
                    "url": "https://ubuntu.com/security/CVE-2022-1184"
                },
                {
                    "reference_url": "https://www.suse.com/security/cve/CVE-2022-1184.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T18:37:22Z/"
                        }
                    ],
                    "url": "https://www.suse.com/security/cve/CVE-2022-1184.html"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035026",
                    "reference_id": "1035026",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035026"
                },
                {
                    "reference_url": "https://lwn.net/Articles/932136/",
                    "reference_id": "932136",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T18:37:22Z/"
                        }
                    ],
                    "url": "https://lwn.net/Articles/932136/"
                },
                {
                    "reference_url": "https://lwn.net/Articles/932137/",
                    "reference_id": "932137",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T18:37:22Z/"
                        }
                    ],
                    "url": "https://lwn.net/Articles/932137/"
                },
                {
                    "reference_url": "https://sylabs.io/2023/04/response-to-cve-2023-30549/",
                    "reference_id": "response-to-cve-2023-30549",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T18:37:22Z/"
                        }
                    ],
                    "url": "https://sylabs.io/2023/04/response-to-cve-2023-30549/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939444?format=api",
                    "purl": "pkg:deb/debian/singularity-container@3.11.4%2Bds1-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@3.11.4%252Bds1-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939435?format=api",
                    "purl": "pkg:deb/debian/singularity-container@4.1.5%2Bds4-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@4.1.5%252Bds4-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2023-30549",
                "GHSA-j4rf-7357-f4cg"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g1xe-smzd-pyfb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44476?format=api",
            "vulnerability_id": "VCID-nhms-k4tr-s7ek",
            "summary": "A vulnerability has been found in Apptainer which could result in the usage of an unexpected of a container.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-39237",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48554",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4848",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4845",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48506",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48557",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48525",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48544",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48571",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48548",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.485",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4855",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48481",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48419",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48502",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48555",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48561",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48603",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48607",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-39237"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39237",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39237"
                },
                {
                    "reference_url": "https://github.com/sylabs/sif",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sylabs/sif"
                },
                {
                    "reference_url": "https://github.com/sylabs/sif/commit/07fb86029a12e3210f6131e065570124605daeaa",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:56:51Z/"
                        }
                    ],
                    "url": "https://github.com/sylabs/sif/commit/07fb86029a12e3210f6131e065570124605daeaa"
                },
                {
                    "reference_url": "https://github.com/sylabs/sif/releases/tag/v2.8.1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sylabs/sif/releases/tag/v2.8.1"
                },
                {
                    "reference_url": "https://github.com/sylabs/sif/security/advisories/GHSA-m5m3-46gj-wch8",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:56:51Z/"
                        }
                    ],
                    "url": "https://github.com/sylabs/sif/security/advisories/GHSA-m5m3-46gj-wch8"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/cve-2004-2761",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/cve-2004-2761"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/cve-2005-4900",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/cve-2005-4900"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-39237",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-39237"
                },
                {
                    "reference_url": "https://pkg.go.dev/vuln/GO-2022-1045",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://pkg.go.dev/vuln/GO-2022-1045"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023570",
                    "reference_id": "1023570",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023570"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-19",
                    "reference_id": "GLSA-202210-19",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:56:51Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202210-19"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939443?format=api",
                    "purl": "pkg:deb/debian/singularity-container@3.10.3%2Bds1-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@3.10.3%252Bds1-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939435?format=api",
                    "purl": "pkg:deb/debian/singularity-container@4.1.5%2Bds4-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@4.1.5%252Bds4-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2022-39237",
                "GHSA-m5m3-46gj-wch8"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nhms-k4tr-s7ek"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36546?format=api",
            "vulnerability_id": "VCID-qmeu-u8p6-9bcp",
            "summary": "A vulnerability in Singularity could result in remote code\n    execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32635",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00632",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70519",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00632",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70326",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00632",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7034",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00632",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70364",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00632",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70349",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00632",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70335",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00632",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70379",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00632",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70388",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00632",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70368",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00632",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7042",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00632",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70429",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00632",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70401",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00632",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70442",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00632",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70473",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00632",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70468",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00632",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70273",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00632",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70286",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00632",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70303",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00632",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7028",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32635"
                },
                {
                    "reference_url": "https://github.com/hpcng/singularity/security/advisories/GHSA-jq42-hfch-42f3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/hpcng/singularity/security/advisories/GHSA-jq42-hfch-42f3"
                },
                {
                    "reference_url": "https://github.com/sylabs/singularity",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sylabs/singularity"
                },
                {
                    "reference_url": "https://github.com/sylabs/singularity/commit/d52ae9d13979733c5e987a566fae59ed6f1bf796",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sylabs/singularity/commit/d52ae9d13979733c5e987a566fae59ed6f1bf796"
                },
                {
                    "reference_url": "https://github.com/sylabs/singularity/releases/tag/v3.7.4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sylabs/singularity/releases/tag/v3.7.4"
                },
                {
                    "reference_url": "https://github.com/sylabs/singularity/security/advisories/GHSA-5mv9-q7fq-9394",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sylabs/singularity/security/advisories/GHSA-5mv9-q7fq-9394"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32635",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32635"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202107-50",
                    "reference_id": "GLSA-202107-50",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202107-50"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939439?format=api",
                    "purl": "pkg:deb/debian/singularity-container@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939435?format=api",
                    "purl": "pkg:deb/debian/singularity-container@4.1.5%2Bds4-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@4.1.5%252Bds4-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-32635",
                "GHSA-5mv9-q7fq-9394"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qmeu-u8p6-9bcp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/216658?format=api",
            "vulnerability_id": "VCID-qr9c-hzvb-uuch",
            "summary": "Sylabs Singularity 3.0 through 3.5 lacks support for an Integrity Check. Singularity's sign and verify commands do not sign metadata found in the global header or data object descriptors of a SIF file.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-13847",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4068",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40764",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40791",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40715",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40765",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40773",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40792",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40757",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40738",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40783",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40753",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40676",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4058",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40568",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40485",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4034",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40407",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40425",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40328",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40353",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40428",
                            "published_at": "2026-05-14T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-13847"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965040",
                    "reference_id": "965040",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965040"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939441?format=api",
                    "purl": "pkg:deb/debian/singularity-container@3.9.5%2Bds1-2?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@3.9.5%252Bds1-2%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939435?format=api",
                    "purl": "pkg:deb/debian/singularity-container@4.1.5%2Bds4-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@4.1.5%252Bds4-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-13847"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qr9c-hzvb-uuch"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48516?format=api",
            "vulnerability_id": "VCID-qz7w-3qvp-ykan",
            "summary": "Path traversal and files overwrite with unsquashfs in singularity\n### Impact\n\nDue to insecure handling of path traversal and the lack of path sanitization within `unsquashfs` (a distribution provided utility used by Singularity), it is possible to overwrite/create any files on the host filesystem during the extraction of a crafted squashfs filesystem.\n\nSquashfs extraction occurs automatically for unprivileged execution of Singularity (either `--without-suid` installation or with `allow setuid = no`) when a user attempts to run an image which:\n\n- is a local SIF image or a single file containing a squashfs filesystem\n- is pulled from remote sources `library://` or `shub://`\n\nImage build is also impacted in a more serious way as it is often performed by the root user, allowing an attacker to overwrite/create files leading to a system compromise.  Bootstrap methods `library`, `shub` and `localimage` trigger a squashfs extraction.\n\n### Patches\n\nThis issue is addressed in Singularity 3.6.4.\n\nAll users are advised to upgrade to 3.6.4 especially if they use Singularity mainly for building image as root user.\n\n### Workarounds\n\nThere is no solid workaround except to temporarily avoid use of unprivileged mode with single file images, in favor of sandbox images instead. Regarding image build, temporarily avoid building from `library` and `shub` sources, and as much as possible use `--fakeroot` or a VM to limit potential impact.\n\n### For more information\n\nGeneral questions about the impact of the advisory / changes made in the 3.6.0 release can be asked in the:\n\n* [Singularity Slack Channel](https://bit.ly/2m0g3lX)\n* [Singularity Mailing List](https://groups.google.com/a/lbl.gov/forum/??sdf%7Csort:date#!forum/singularity)\n\nAny sensitive security concerns should be directed to: security@sylabs.io\n\nSee our Security Policy here: https://sylabs.io/security-policy",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00070.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00070.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00071.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00071.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00009.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15229",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75484",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75343",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75333",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75368",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75373",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75377",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75385",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75414",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7544",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75419",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75429",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75243",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75246",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75278",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75255",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75298",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75309",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7533",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75308",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75297",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75336",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15229"
                },
                {
                    "reference_url": "https://github.com/hpcng/singularity/blob/v3.6.4/CHANGELOG.md#security-related-fixes",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/hpcng/singularity/blob/v3.6.4/CHANGELOG.md#security-related-fixes"
                },
                {
                    "reference_url": "https://github.com/hpcng/singularity/commit/eba3dea260b117198fdb6faf41f2482ab2f8d53e",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/hpcng/singularity/commit/eba3dea260b117198fdb6faf41f2482ab2f8d53e"
                },
                {
                    "reference_url": "https://github.com/hpcng/singularity/pull/5611",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/hpcng/singularity/pull/5611"
                },
                {
                    "reference_url": "https://github.com/hpcng/singularity/security/advisories/GHSA-7gcp-w6ww-2xv9",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/hpcng/singularity/security/advisories/GHSA-7gcp-w6ww-2xv9"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15229",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15229"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972212",
                    "reference_id": "972212",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972212"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939441?format=api",
                    "purl": "pkg:deb/debian/singularity-container@3.9.5%2Bds1-2?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@3.9.5%252Bds1-2%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939435?format=api",
                    "purl": "pkg:deb/debian/singularity-container@4.1.5%2Bds4-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@4.1.5%252Bds4-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-15229",
                "GHSA-7gcp-w6ww-2xv9"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qz7w-3qvp-ykan"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/251096?format=api",
            "vulnerability_id": "VCID-uakh-v3bf-77cq",
            "summary": "Sylabs Singularity Enterprise through 1.6.2 has Insufficient Entropy in a nonce.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33027",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69593",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69606",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69622",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.696",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69651",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69668",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6969",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69675",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6966",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69701",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6971",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69691",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69743",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69752",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69758",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69732",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69776",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69806",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69777",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69802",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69853",
                            "published_at": "2026-05-14T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33027"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939439?format=api",
                    "purl": "pkg:deb/debian/singularity-container@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939435?format=api",
                    "purl": "pkg:deb/debian/singularity-container@4.1.5%2Bds4-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@4.1.5%252Bds4-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-33027"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uakh-v3bf-77cq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/251479?format=api",
            "vulnerability_id": "VCID-v5ff-gwhq-sqbh",
            "summary": "Sylabs Singularity 3.5.x and 3.6.x, and SingularityPRO before 3.5-8, has an Incorrect Check of a Function's Return Value.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00547",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67778",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00547",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67812",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00547",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67831",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00547",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67811",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00547",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67862",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00547",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67876",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00547",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67899",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00547",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67886",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00547",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67849",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00547",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67885",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00547",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67898",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00547",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67879",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00547",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67909",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00547",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67913",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00547",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67888",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00547",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6793",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00547",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67971",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00547",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6794",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00547",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67965",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00547",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68021",
                            "published_at": "2026-05-14T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33622"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990201",
                    "reference_id": "990201",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990201"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939441?format=api",
                    "purl": "pkg:deb/debian/singularity-container@3.9.5%2Bds1-2?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@3.9.5%252Bds1-2%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939435?format=api",
                    "purl": "pkg:deb/debian/singularity-container@4.1.5%2Bds4-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@4.1.5%252Bds4-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-33622"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v5ff-gwhq-sqbh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54760?format=api",
            "vulnerability_id": "VCID-wwmk-7199-huc1",
            "summary": "Sylabs Singularity Improper Input Validation\nSylabs Singularity 2.4 to 2.6 allows local users to conduct Improper Input Validation attacks.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30418",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30666",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3055",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30466",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30325",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30397",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30404",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30328",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30351",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30857",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30983",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31031",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30849",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30907",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30937",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3094",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30897",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30852",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30884",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30863",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30829",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19295"
                },
                {
                    "reference_url": "https://github.com/sylabs/singularity",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sylabs/singularity"
                },
                {
                    "reference_url": "https://github.com/sylabs/singularity/commit/9103f0155259fdf1159277bca3c2d347571cba0d",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sylabs/singularity/commit/9103f0155259fdf1159277bca3c2d347571cba0d"
                },
                {
                    "reference_url": "https://github.com/sylabs/singularity/releases/tag/2.6.1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sylabs/singularity/releases/tag/2.6.1"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19295"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/USN-4840-1/",
                    "reference_id": "USN-USN-4840-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/USN-4840-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939437?format=api",
                    "purl": "pkg:deb/debian/singularity-container@2.6.1-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@2.6.1-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939435?format=api",
                    "purl": "pkg:deb/debian/singularity-container@4.1.5%2Bds4-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@4.1.5%252Bds4-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2018-19295",
                "GHSA-p83v-8vmr-qfv9"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wwmk-7199-huc1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37089?format=api",
            "vulnerability_id": "VCID-x9mw-wgx6-dyge",
            "summary": "Execution Control List (ECL) Is Insecure in Singularity\n### Impact\n\nThe Singularity Execution Control List (ECL) allows system administrators to set up a policy that defines rules about what signature(s) must be (or must not be) present on a SIF container image for it to be permitted to run.\n\nIn Singularity 3.x versions below 3.6.0, the following issues allow the ECL to be bypassed by a malicious user:\n\n * Image integrity is not validated when an ECL policy is enforced.\n * The fingerprint required by the ECL is compared against the signature object descriptor(s) in the SIF file, rather than to a cryptographically validated signature. Thus, it is trivial to craft an arbitrary payload which will be permitted to run, even if the attacker does not have access to the private key associated with the fingerprint(s) configured in the ECL.\n\n### Patches\n\nThese issues are addressed in Singularity 3.6.0.\n\nAll users are advised to upgrade to 3.6.0. Note that Singularity 3.6.0 uses a new signature format that is necessarily incompatible with Singularity < 3.6.0 - e.g. Singularity 3.5.3 cannot verify containers signed by 3.6.0.\n\nVersion 3.6.0 includes a `legacyinsecure` option that can be set to `legacyinsecure = true` in `ecl.toml` to allow the ECL to perform verification of the older, and insecure, legacy signatures for compatibility with existing containers. This does not guarantee that containers have not been modified since signing, due to other issues in the legacy signature format. The option should be used only to temporarily ease the transition to containers signed with the new 3.6.0 signature format.\n\n### Workarounds\n\nThis issue affects any installation of Singularity configured to use the Execution Control List (ECL) functionality. There is no workaround if ECL is required.\n\n### For more information\n\nGeneral questions about the impact of the advisory / changes made in the 3.6.0 release can be asked in the:\n\n* [Singularity Slack Channel](https://bit.ly/2m0g3lX)\n* [Singularity Mailing List](https://groups.google.com/a/lbl.gov/forum/??sdf%7Csort:date#!forum/singularity)\n\nAny sensitive security concerns should be directed to: security@sylabs.io\n\nSee our Security Policy here: https://sylabs.io/security-policy",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00046.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00046.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00053.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00053.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-13845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23238",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2313",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23023",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23106",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2318",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23142",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23159",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23299",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23472",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23509",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23293",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23366",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23417",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23436",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23399",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23345",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23362",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23356",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23336",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23145",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23138",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-13845"
                },
                {
                    "reference_url": "https://github.com/hpcng/singularity/security/advisories/GHSA-pmfr-63c2-jr5c",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/hpcng/singularity/security/advisories/GHSA-pmfr-63c2-jr5c"
                },
                {
                    "reference_url": "https://medium.com/sylabs",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://medium.com/sylabs"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13845"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965040",
                    "reference_id": "965040",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965040"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939441?format=api",
                    "purl": "pkg:deb/debian/singularity-container@3.9.5%2Bds1-2?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@3.9.5%252Bds1-2%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939435?format=api",
                    "purl": "pkg:deb/debian/singularity-container@4.1.5%2Bds4-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@4.1.5%252Bds4-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-13845",
                "GHSA-pmfr-63c2-jr5c"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x9mw-wgx6-dyge"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@4.1.5%252Bds4-1%3Fdistro=sid"
}