CLUSTERPRO X Ver5.1 and earlier and EXPRESSCLUSTER X 5.1 and earlier, CLUSTERPRO X SingleServerSafe 5.1 and earlier, EXPRESSCLUSTER X SingleServerSafe 5.1 and earlier allows a attacker to log in to the product may execute an arbitrary command.
                
            References
                    | Link | Resource | 
|---|---|
| https://jpn.nec.com/security-info/secinfo/nv23-009_en.html | Patch Third Party Advisory | 
| https://jpn.nec.com/security-info/secinfo/nv23-009_en.html | Patch Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 08:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://jpn.nec.com/security-info/secinfo/nv23-009_en.html - Patch, Third Party Advisory | 
24 Nov 2023, 17:56
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2023-11-17 06:15
Updated : 2024-11-21 08:15
NVD link : CVE-2023-39547
Mitre link : CVE-2023-39547
CVE.ORG link : CVE-2023-39547
JSON object : View
Products Affected
                nec
- expresscluster_x_singleserversafe
- expresscluster_x
CWE
                
                    
                        
                        CWE-294
                        
            Authentication Bypass by Capture-replay
