{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T09:51:52.829","vulnerabilities":[{"cve":{"id":"CVE-2025-29828","sourceIdentifier":"secure@microsoft.com","published":"2025-06-10T17:21:17.087","lastModified":"2025-07-10T13:50:16.847","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Missing release of memory after effective lifetime in Windows Cryptographic Services allows an unauthorized attacker to execute code over a network."},{"lang":"es","value":"La falta de liberación de memoria después de un tiempo de vida útil efectivo en los Servicios criptográficos de Windows permite que un atacante no autorizado ejecute código a través de una red."}],"metrics":{"cvssMetricV31":[{"source":"secure@microsoft.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9}]},"weaknesses":[{"source":"secure@microsoft.com","type":"Secondary","description":[{"lang":"en","value":"CWE-401"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.22621.5472","matchCriteriaId":"FCDDDE2C-0235-4792-905A-DDDF5D346BDC"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.22631.5472","matchCriteriaId":"53835865-3135-4F16-9868-C96D8C5E2BED"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.26100.4270","matchCriteriaId":"AA78F5F9-AEE3-423B-B82A-9ECEF2BDADF3"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.20348.3745","matchCriteriaId":"889A792E-8809-4A78-AABC-0567D025927A"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.25398.1665","matchCriteriaId":"537E7AD5-0562-490B-AB16-0805F8865C74"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.26100.4270","matchCriteriaId":"BD4BB5C4-1318-4006-9C50-0AED4E0C8A3F"}]}]}],"references":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29828","source":"secure@microsoft.com","tags":["Vendor Advisory"]}]}}]}