Multiple authenticated command injection vulnerabilities exist in the command line interface. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: hpe
Published:
Updated: 2024-08-02T01:52:57.100Z
Reserved: 2024-04-03T21:21:22.897Z
Link: CVE-2024-31476

Updated: 2024-05-15T13:40:05.469Z

Status : Awaiting Analysis
Published: 2024-05-14T23:15:11.150
Modified: 2024-11-21T09:13:36.430
Link: CVE-2024-31476

No data.