CLUSTERPRO X Ver5.1 and earlier and EXPRESSCLUSTER X 5.1 and earlier, CLUSTERPRO X SingleServerSafe 5.1 and earlier, EXPRESSCLUSTER X SingleServerSafe 5.1 and earlier allows a attacker to log in to the product may execute an arbitrary command.
References
Link | Resource |
---|---|
https://jpn.nec.com/security-info/secinfo/nv23-009_en.html | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
28 Dec 2023, 17:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:nec:expresscluster_x:5.1:*:*:*:*:windows:*:* cpe:2.3:a:nec:expresscluster_x_singleserversafe:5.1:*:*:*:*:linux:*:* cpe:2.3:a:nec:expresscluster_x:5.1:*:*:*:*:linux:*:* cpe:2.3:a:nec:expresscluster_x_singleserversafe:5.1:*:*:*:*:windows:*:* |
24 Nov 2023, 18:22
Type | Values Removed | Values Added |
---|---|---|
First Time |
Nec
Nec expresscluster X Nec expresscluster X Singleserversafe |
|
CPE | cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.3:*:*:*:*:linux:*:* cpe:2.3:a:nec:expresscluster_x:3.1:*:*:*:*:linux:*:* cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.1:*:*:*:*:windows:*:* cpe:2.3:a:nec:expresscluster_x_singleserversafe:1.0:*:*:*:*:windows:*:* cpe:2.3:a:nec:expresscluster_x:4.3:*:*:*:*:linux:*:* cpe:2.3:a:nec:expresscluster_x_singleserversafe:2.0:*:*:*:*:linux:*:* cpe:2.3:a:nec:expresscluster_x:3.3:*:*:*:*:linux:*:* cpe:2.3:a:nec:expresscluster_x:5.0:*:*:*:*:windows:*:* cpe:2.3:a:nec:expresscluster_x:4.1:*:*:*:*:linux:*:* cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.1:*:*:*:*:linux:*:* cpe:2.3:a:nec:expresscluster_x_singleserversafe:5.0:*:*:*:*:windows:*:* cpe:2.3:a:nec:expresscluster_x_singleserversafe:2.1:*:*:*:*:windows:*:* cpe:2.3:a:nec:expresscluster_x:4.2:*:*:*:*:windows:*:* cpe:2.3:a:nec:expresscluster_x:2.0:*:*:*:*:linux:*:* cpe:2.3:a:nec:expresscluster_x:4.1:*:*:*:*:windows:*:* cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.3:*:*:*:*:windows:*:* cpe:2.3:a:nec:expresscluster_x:4.3:*:*:*:*:windows:*:* cpe:2.3:a:nec:expresscluster_x:3.0:*:*:*:*:linux:*:* cpe:2.3:a:nec:expresscluster_x_singleserversafe:2.1:*:*:*:*:linux:*:* cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.1:*:*:*:*:linux:*:* cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.1:*:*:*:*:windows:*:* cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.0:*:*:*:*:windows:*:* cpe:2.3:a:nec:expresscluster_x_singleserversafe:5.0:*:*:*:*:linux:*:* cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.3:*:*:*:*:linux:*:* cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.3:*:*:*:*:windows:*:* cpe:2.3:a:nec:expresscluster_x:4.0:*:*:*:*:linux:*:* cpe:2.3:a:nec:expresscluster_x:5.0:*:*:*:*:linux:*:* cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.2:*:*:*:*:linux:*:* cpe:2.3:a:nec:expresscluster_x_singleserversafe:1.0:*:*:*:*:linux:*:* cpe:2.3:a:nec:expresscluster_x:3.2:*:*:*:*:windows:*:* cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.2:*:*:*:*:linux:*:* cpe:2.3:a:nec:expresscluster_x:1.0:*:*:*:*:linux:*:* cpe:2.3:a:nec:expresscluster_x:2.1:*:*:*:*:windows:*:* cpe:2.3:a:nec:expresscluster_x_singleserversafe:2.0:*:*:*:*:windows:*:* cpe:2.3:a:nec:expresscluster_x:2.0:*:*:*:*:windows:*:* cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.2:*:*:*:*:windows:*:* cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.0:*:*:*:*:windows:*:* cpe:2.3:a:nec:expresscluster_x:3.1:*:*:*:*:windows:*:* cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.0:*:*:*:*:linux:*:* cpe:2.3:a:nec:expresscluster_x:3.0:*:*:*:*:windows:*:* cpe:2.3:a:nec:expresscluster_x:1.0:*:*:*:*:windows:*:* cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.0:*:*:*:*:linux:*:* cpe:2.3:a:nec:expresscluster_x:3.3:*:*:*:*:windows:*:* cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.2:*:*:*:*:windows:*:* cpe:2.3:a:nec:expresscluster_x:4.0:*:*:*:*:windows:*:* cpe:2.3:a:nec:expresscluster_x:3.2:*:*:*:*:linux:*:* cpe:2.3:a:nec:expresscluster_x:4.2:*:*:*:*:linux:*:* cpe:2.3:a:nec:expresscluster_x:2.1:*:*:*:*:linux:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
CWE | CWE-434 | |
References | () https://jpn.nec.com/security-info/secinfo/nv23-009_en.html - Patch, Third Party Advisory |
24 Nov 2023, 12:15
Type | Values Removed | Values Added |
---|---|---|
Summary | CLUSTERPRO X Ver5.1 and earlier and EXPRESSCLUSTER X 5.1 and earlier, CLUSTERPRO X SingleServerSafe 5.1 and earlier, EXPRESSCLUSTER X SingleServerSafe 5.1 and earlier allows a attacker to log in to the product may execute an arbitrary command. |
17 Nov 2023, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-17 06:15
Updated : 2024-02-28 20:54
NVD link : CVE-2023-39548
Mitre link : CVE-2023-39548
CVE.ORG link : CVE-2023-39548
JSON object : View
Products Affected
nec
- expresscluster_x_singleserversafe
- expresscluster_x
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type