{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-16T22:09:19.900","vulnerabilities":[{"cve":{"id":"CVE-2022-44684","sourceIdentifier":"secure@microsoft.com","published":"2023-12-20T20:15:19.003","lastModified":"2024-11-21T07:28:19.023","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Windows Local Session Manager (LSM) Denial of Service Vulnerability"},{"lang":"es","value":"Vulnerabilidad de denegación de servicio de Windows Local Session Manager (LSM)"}],"metrics":{"cvssMetricV31":[{"source":"secure@microsoft.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.19042.2364","matchCriteriaId":"AA5A49C2-6A51-4A73-AC74-532BC6430763"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.19043.2364","matchCriteriaId":"86AEB671-97BB-4C0C-AC20-AFF67C541FA3"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.19044.2364","matchCriteriaId":"B0458BC1-9795-459C-826C-A6A094AE03DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.19045.2364","matchCriteriaId":"0D4D2A8F-5F2C-4A6F-902C-6C1DAD745CCE"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.22000.1335","matchCriteriaId":"9E936B0C-9BA0-4C70-8469-F8D79A9B72E4"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.22621.993","matchCriteriaId":"F9DC28E9-C12F-45C4-B591-B52CDABCBA98"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*","matchCriteriaId":"821614DD-37DD-44E2-A8A4-FE8D23A33C3C"}]}]}],"references":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44684","source":"secure@microsoft.com","tags":["Broken Link","Patch","Vendor Advisory"]},{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44684","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Patch","Vendor Advisory"]}]}}]}