{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T19:51:14.327","vulnerabilities":[{"cve":{"id":"CVE-2024-31476","sourceIdentifier":"security-alert@hpe.com","published":"2024-05-14T23:15:11.150","lastModified":"2025-06-24T16:15:24.920","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Multiple authenticated command injection vulnerabilities exist in the command line interface. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system."},{"lang":"es","value":"Existen múltiples vulnerabilidades de inyección de comandos autenticados en la interfaz de línea de comandos. La explotación exitosa de estas vulnerabilidades da como resultado la capacidad de ejecutar comandos arbitrarios como usuario privilegiado en el sistema operativo subyacente."}],"metrics":{"cvssMetricV31":[{"source":"security-alert@hpe.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*","versionStartIncluding":"10.3.0.0","versionEndExcluding":"10.4.1.1","matchCriteriaId":"C22DF47A-ECDC-4FB3-9361-2CE8972F2403"},{"vulnerable":true,"criteria":"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*","versionStartIncluding":"10.5.0.0","versionEndExcluding":"10.5.1.1","matchCriteriaId":"3088AE26-C175-4D22-A550-30B97164D15B"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:instantos:*:*:*:*:*:*:*:*","versionStartIncluding":"6.4.0.0","versionEndExcluding":"8.6.0.24","matchCriteriaId":"3EF296DF-98BB-4347-A655-F3046220FFB5"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:instantos:*:*:*:*:*:*:*:*","versionStartIncluding":"8.7.0.0","versionEndExcluding":"8.10.0.11","matchCriteriaId":"5D7CDA65-CB99-4A70-9E12-B38BC7A69F1A"}]}]}],"references":[{"url":"https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04647en_us&docLocale=en_US","source":"security-alert@hpe.com"},{"url":"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-006.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Vendor Advisory"]}]}}]}