Vulnerabilities > Adaptivecomputing > Moab

DATE CVE VULNERABILITY TITLE RISK
2014-10-08 CVE-2014-5376 Improper Input Validation vulnerability in Adaptivecomputing Moab 8.0
Adaptive Computing Moab before 7.2.9 and 8 before 8.0.0, when a pre-generated key is used, does not validate that the requesting user matches the actor in the message, which allows remote authenticated users to impersonate arbitrary users via the actor field in a message.
network
low complexity
adaptivecomputing CWE-20
4.0
2014-10-08 CVE-2014-5375 Improper Input Validation vulnerability in Adaptivecomputing Moab 8.0
The server in Adaptive Computing Moab before 7.2.9 and 8 before 8.0.0 does not properly validate the message owner matches the submitting user, which allows remote authenticated users to impersonate arbitrary users via the UserId and Owner tags.
network
low complexity
adaptivecomputing CWE-20
4.0
2014-10-08 CVE-2014-5300 Improper Authentication vulnerability in Adaptivecomputing Moab 8.0
Adaptive Computing Moab before 7.2.9 and 8 before 8.0.0 allows remote attackers to bypass the signature check, impersonate arbitrary users, and execute commands via a message without a signature.
network
low complexity
adaptivecomputing CWE-287
5.0