Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
john fitzpatrick vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-5375
The server in Adaptive Computing Moab prior to 7.2.9 and 8 prior to 8.0.0 does not properly validate the message owner matches the submitting user, which allows remote authenticated users to impersonate arbitrary users via the UserId and Owner tags.
Adaptivecomputing Moab
Adaptivecomputing Moab 8.0
6.6
CVSSv3
CVE-2014-7301
SGI Tempo, as used on SGI ICE-X systems, uses weak permissions for certain files, which allows local users to obtain password hashes and possibly other unspecified sensitive information by reading /etc/odapw.
Hp Sgi Tempo -
7.8
CVSSv3
CVE-2014-7303
SGI Tempo, as used on SGI ICE-X systems, uses weak permissions for certain files, which allows local users to obtain password hashes and possibly other unspecified sensitive information by reading etc/dbdump.db.
Hp Sgi Tempo -
8
CVSSv3
CVE-2019-15719
Altair PBS Professional up to and including 19.1.2 allows Privilege Escalation because an attacker can send a message directly to pbs_mom, which fails to properly authenticate the message. This results in code execution as an arbitrary user.
Altair Pbs Professional
NA
CVE-2014-5300
Adaptive Computing Moab prior to 7.2.9 and 8 prior to 8.0.0 allows remote malicious users to bypass the signature check, impersonate arbitrary users, and execute commands via a message without a signature.
Adaptivecomputing Moab
Adaptivecomputing Moab 8.0
1 EDB exploit
NA
CVE-2014-5376
Adaptive Computing Moab prior to 7.2.9 and 8 prior to 8.0.0, when a pre-generated key is used, does not validate that the requesting user matches the actor in the message, which allows remote authenticated users to impersonate arbitrary users via the actor field in a message.
Adaptivecomputing Moab 8.0
Adaptivecomputing Moab
NA
CVE-2014-0748
apinit on Cray devices with CLE prior to 4.2.UP02 and 5.x prior to 5.1.UP00 does not use alpsauth data to validate the UID in a launch message, which allows local users to gain privileges via a modified aprun program, aka ID FN5912.
Cray Cray Linux Environment
Cray Cray Linux Environment 5.1
7.8
CVSSv3
CVE-2014-7302
SGI Tempo, as used on SGI ICE-X systems, uses weak permissions for certain files, which allows local users to change the permissions of arbitrary files by executing /opt/sgi/sgimc/bin/vx.
Hp Sgi Tempo -
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-21991
CVE-2024-32674
path traversal
CVE-2023-21987
denial of service
dos
CVE-2024-4647
CVE-2024-25519
CVE-2024-33612
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started