{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T17:52:12.247","vulnerabilities":[{"cve":{"id":"CVE-2021-22505","sourceIdentifier":"security@opentext.com","published":"2021-04-13T14:15:13.833","lastModified":"2024-11-21T05:50:14.493","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Escalation of privileges vulnerability in Micro Focus Operations Agent, affects versions 12.0x, 12.10, 12.11, 12.12, 12.14 and 12.15. The vulnerability could be exploited to escalate privileges and execute code under the account of the Operations Agent."},{"lang":"es","value":"Una vulnerabilidad de escalada de privilegios en Micro Focus Operations Agent afecta a versiones 12.0x, 12.10, 12.11, 12.12, 12.14 y 12.15.&#xa0;La vulnerabilidad podría ser explotada para escalar privilegios y ejecutar código bajo la cuenta del Operations Agent"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:operations_agent:12.0:*:*:*:*:*:*:*","matchCriteriaId":"B386C147-D89B-45C2-9C68-545C1102F519"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:operations_agent:12.01:*:*:*:*:*:*:*","matchCriteriaId":"1A21863B-4079-44B7-9E77-AEF2ACFEE866"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:operations_agent:12.02:*:*:*:*:*:*:*","matchCriteriaId":"BCB70185-D717-4CCD-96D7-D87DB0B26D23"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:operations_agent:12.03:*:*:*:*:*:*:*","matchCriteriaId":"BFAEA425-6775-422A-810F-34148C0568D5"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:operations_agent:12.04:*:*:*:*:*:*:*","matchCriteriaId":"36D8E42D-76B8-44F1-9D5E-1E028856048B"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:operations_agent:12.05:*:*:*:*:*:*:*","matchCriteriaId":"2CE2D00B-25CF-46C5-9A59-7288D027FF4C"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:operations_agent:12.06:*:*:*:*:*:*:*","matchCriteriaId":"F4AF06A9-7934-49E4-BA84-4060F069FE12"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:operations_agent:12.10:*:*:*:*:*:*:*","matchCriteriaId":"71E8620F-E030-4A29-9630-E52FE9F8CBAF"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:operations_agent:12.11:*:*:*:*:*:*:*","matchCriteriaId":"7DCB40C1-168E-41AE-B346-C3579ECCE8B0"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:operations_agent:12.12:*:*:*:*:*:*:*","matchCriteriaId":"89DB61A8-FE89-46FA-AE38-65B79998BB82"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:operations_agent:12.14:*:*:*:*:*:*:*","matchCriteriaId":"B55488BF-8BF0-489C-8FEF-2B68F5964B15"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:operations_agent:12.15:*:*:*:*:*:*:*","matchCriteriaId":"973DFAB3-05AE-49A0-917B-ADAD9C296322"}]}]}],"references":[{"url":"https://softwaresupport.softwaregrp.com/doc/KM03792442","source":"security@opentext.com"},{"url":"https://softwaresupport.softwaregrp.com/doc/KM03792442","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}