RSS   Vulnerabilities for 'MOAB'   RSS

2014-10-08
 
CVE-2014-5376

CWE-20
 

 
Adaptive Computing Moab before 7.2.9 and 8 before 8.0.0, when a pre-generated key is used, does not validate that the requesting user matches the actor in the message, which allows remote authenticated users to impersonate arbitrary users via the actor field in a message.

 
 
CVE-2014-5375

CWE-20
 

 
The server in Adaptive Computing Moab before 7.2.9 and 8 before 8.0.0 does not properly validate the message owner matches the submitting user, which allows remote authenticated users to impersonate arbitrary users via the UserId and Owner tags.

 
 
CVE-2014-5300

CWE-287
 

 
Adaptive Computing Moab before 7.2.9 and 8 before 8.0.0 allows remote attackers to bypass the signature check, impersonate arbitrary users, and execute commands via a message without a signature.

 

 >>> Vendor: Adaptivecomputing 2 Products
Torque resource manager
MOAB


Copyright 2019, cxsecurity.com

 

Back to Top