{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T02:27:31.670","vulnerabilities":[{"cve":{"id":"CVE-2021-26587","sourceIdentifier":"security-alert@hpe.com","published":"2021-09-27T15:15:07.513","lastModified":"2024-11-21T05:56:32.260","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A potential DOM-based Cross Site Scripting security vulnerability has been identified in HPE StoreOnce. The vulnerability could be remotely exploited to cause an elevation of privilege leading to partial impact to confidentiality, availability, and integrity. HPE has made the following software update - HPE StoreOnce 4.3.0, to resolve the vulnerability in HPE StoreOnce."},{"lang":"es","value":"Se ha identificado una posible vulnerabilidad de seguridad de tipo Cross Site Scripting basada en DOM en HPE StoreOnce. La vulnerabilidad podría ser explotada remotamente para causar una elevación de privilegios que conlleva a un impacto parcial en la confidencialidad, la disponibilidad y la integridad. HPE ha realizado la siguiente actualización de software - HPE StoreOnce versión 4.3.0, para resolver la vulnerabilidad en HPE StoreOnce"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.3,"impactScore":3.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:P/I:P/A:P","baseScore":6.0,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":6.8,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hpe:storeonce_5200_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"4.2.3","matchCriteriaId":"53AB0828-FF53-4733-BE40-5EF0EBCE5D90"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:hpe:storeonce_5200:-:*:*:*:*:*:*:*","matchCriteriaId":"279A8D38-05FA-452D-AAC4-BA58FD5DD04C"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hpe:storeonce_5650_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"4.2.3","matchCriteriaId":"429ED84E-7274-4FFC-A57A-C8CAA91FB5D9"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:hpe:storeonce_5650:-:*:*:*:*:*:*:*","matchCriteriaId":"1EDCC6E4-0E66-4263-A610-D17ACC072A1F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hpe:storeonce_5250_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"4.2.3","matchCriteriaId":"53741142-DFCA-42DB-A666-6784FB659DBA"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:hpe:storeonce_5250:-:*:*:*:*:*:*:*","matchCriteriaId":"398942BB-98D1-4CBD-9A65-A05F979806EF"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hpe:storeonce_3640_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"4.2.3","matchCriteriaId":"AEAA609A-AD41-4097-8112-990AEB5B5565"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:hpe:storeonce_3640:-:*:*:*:*:*:*:*","matchCriteriaId":"963FF36A-EB2F-4828-BCAC-9E22F8F4F838"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hpe:storeonce_3620_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"4.2.3","matchCriteriaId":"B1F673C7-3DA8-4F12-ACAE-2CDB09086B60"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:hpe:storeonce_3620:-:*:*:*:*:*:*:*","matchCriteriaId":"80CE5CAD-48C5-4FAE-B3DD-DF96BFB516B4"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hpe:storeonce_vsa_4tb_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"4.2.3","matchCriteriaId":"B6B31C2D-8038-414D-88A0-95965AF6D90A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:hpe:storeonce_vsa_4tb:-:*:*:*:*:*:*:*","matchCriteriaId":"0F7C0CF6-31B7-4D24-93D7-3E4EEB5281A9"}]}]}],"references":[{"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst04176en_us","source":"security-alert@hpe.com","tags":["Vendor Advisory"]},{"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst04176en_us","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}