Lucene search

K

Adaptivecomputing Security Vulnerabilities

cve
cve

CVE-2013-4319

pbs_mom in Terascale Open-Source Resource and Queue Manager (aka TORQUE Resource Manager) 2.5.x, 4.x, and earlier does not properly restrict access by unprivileged ports, which allows remote authenticated users to execute arbitrary jobs by submitting a command.

6.8AI Score

0.003EPSS

2013-10-11 10:55 PM
30
cve
cve

CVE-2013-4495

The send_the_mail function in server/svr_mail.c in Terascale Open-Source Resource and Queue Manager (aka TORQUE Resource Manager) before 4.2.6 allows remote attackers to execute arbitrary commands via shell metacharacters in the email (-M switch) to qsub.

7.4AI Score

0.016EPSS

2013-11-20 02:12 PM
37
cve
cve

CVE-2014-0749

Stack-based buffer overflow in lib/Libdis/disrsi_.c in Terascale Open-Source Resource and Queue Manager (aka TORQUE Resource Manager) 2.5.x through 2.5.13 allows remote attackers to execute arbitrary code via a large count value.

7.9AI Score

0.432EPSS

2014-05-16 02:55 PM
36
cve
cve

CVE-2014-3684

The tm_adopt function in lib/Libifl/tm.c in Terascale Open-Source Resource and Queue Manager (aka TORQUE Resource Manager) 5.0.x, 4.5.x, 4.2.x, and earlier does not validate that the owner of the process also owns the adopted session id, which allows remote authenticated users to kill arbitrary pro...

6.1AI Score

0.004EPSS

2014-10-30 02:55 PM
36
cve
cve

CVE-2014-5300

Adaptive Computing Moab before 7.2.9 and 8 before 8.0.0 allows remote attackers to bypass the signature check, impersonate arbitrary users, and execute commands via a message without a signature.

7.2AI Score

0.044EPSS

2014-10-08 07:55 PM
28
cve
cve

CVE-2014-5375

The server in Adaptive Computing Moab before 7.2.9 and 8 before 8.0.0 does not properly validate the message owner matches the submitting user, which allows remote authenticated users to impersonate arbitrary users via the UserId and Owner tags.

6.5AI Score

0.004EPSS

2014-10-08 07:55 PM
19
cve
cve

CVE-2014-5376

Adaptive Computing Moab before 7.2.9 and 8 before 8.0.0, when a pre-generated key is used, does not validate that the requesting user matches the actor in the message, which allows remote authenticated users to impersonate arbitrary users via the actor field in a message.

6.5AI Score

0.004EPSS

2014-10-08 07:55 PM
23