CVE-2023-39546

CLUSTERPRO X Ver5.1 and earlier and EXPRESSCLUSTER X 5.1 and earlier, CLUSTERPRO X SingleServerSafe 5.1 and earlier, EXPRESSCLUSTER X SingleServerSafe 5.1 and earlier allows a attacker to log in to the product may execute an arbitrary command.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:nec:expresscluster_x:1.0:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:1.0:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x:2.0:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:2.0:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x:2.1:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:2.1:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x:3.0:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:3.0:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x:3.1:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:3.1:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x:3.2:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:3.2:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x:3.3:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:3.3:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x:4.0:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:4.0:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x:4.1:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:4.1:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x:4.2:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:4.2:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x:4.3:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:4.3:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x:5.0:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:5.0:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x:5.1:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:5.1:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:1.0:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:1.0:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:2.0:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:2.0:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:2.1:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:2.1:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.0:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.0:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.1:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.1:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.2:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.2:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.3:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.3:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.0:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.0:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.1:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.1:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.2:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.2:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.3:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.3:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:5.0:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:5.0:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:5.1:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:5.1:*:*:*:*:windows:*:*

History

24 Nov 2023, 18:24

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-17 06:15

Updated : 2024-02-05 00:22


NVD link : CVE-2023-39546

Mitre link : CVE-2023-39546

CVE.ORG link : CVE-2023-39546


JSON object : View

Products Affected

nec

  • expresscluster_x_singleserversafe
  • expresscluster_x
CWE
NVD-CWE-noinfo CWE-836

Use of Password Hash Instead of Password for Authentication