CVE-2014-5300

Adaptivecomputing Moab < 7.2.8 - Authentication Bypass

Title source: rule
STIX 2.1

Description

Adaptive Computing Moab before 7.2.9 and 8 before 8.0.0 allows remote attackers to bypass the signature check, impersonate arbitrary users, and execute commands via a message without a signature.

Exploits (1)

exploitdb WORKING POC
by MWR InfoSecurity · textwebappsmultiple
https://www.exploit-db.com/exploits/34865

References (6)

Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/70173
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/533574/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/96699
Vendor Advisory x_refsource_confirm
http://www.adaptivecomputing.com/security-advisory/
Exploit exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/34865

Scores

EPSS 0.1532
EPSS Percentile 94.7%

Details

CWE
CWE-287
Status published
Products (2)
adaptivecomputing/moab 8.0
adaptivecomputing/moab < 7.2.8
Published Oct 08, 2014
Tracked Since Feb 18, 2026