Filtered by vendor Adaptivecomputing
                        
                        Subscribe
                        
                        
                    
                    
                
                        Filtered by product Torque Resource Manager
                        
                        Subscribe
                        
                        
                    
                    
                
                    Total
                    4 CVE
                
            | CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 | 
|---|---|---|---|---|---|
| CVE-2014-0749 | 1 Adaptivecomputing | 1 Torque Resource Manager | 2018-10-09 | 10.0 HIGH | N/A | 
| Stack-based buffer overflow in lib/Libdis/disrsi_.c in Terascale Open-Source Resource and Queue Manager (aka TORQUE Resource Manager) 2.5.x through 2.5.13 allows remote attackers to execute arbitrary code via a large count value. | |||||
| CVE-2014-3684 | 1 Adaptivecomputing | 1 Torque Resource Manager | 2016-12-31 | 6.8 MEDIUM | N/A | 
| The tm_adopt function in lib/Libifl/tm.c in Terascale Open-Source Resource and Queue Manager (aka TORQUE Resource Manager) 5.0.x, 4.5.x, 4.2.x, and earlier does not validate that the owner of the process also owns the adopted session id, which allows remote authenticated users to kill arbitrary processes via a crafted executable. | |||||
| CVE-2013-4495 | 1 Adaptivecomputing | 1 Torque Resource Manager | 2016-12-08 | 10.0 HIGH | N/A | 
| The send_the_mail function in server/svr_mail.c in Terascale Open-Source Resource and Queue Manager (aka TORQUE Resource Manager) before 4.2.6 allows remote attackers to execute arbitrary commands via shell metacharacters in the email (-M switch) to qsub. | |||||
| CVE-2013-4319 | 1 Adaptivecomputing | 1 Torque Resource Manager | 2013-10-15 | 9.0 HIGH | N/A | 
| pbs_mom in Terascale Open-Source Resource and Queue Manager (aka TORQUE Resource Manager) 2.5.x, 4.x, and earlier does not properly restrict access by unprivileged ports, which allows remote authenticated users to execute arbitrary jobs by submitting a command. | |||||
