{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T18:46:01.609","vulnerabilities":[{"cve":{"id":"CVE-2025-50176","sourceIdentifier":"secure@microsoft.com","published":"2025-08-12T18:15:36.377","lastModified":"2025-08-19T14:36:17.890","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Access of resource using incompatible type ('type confusion') in Graphics Kernel allows an authorized attacker to execute code locally."},{"lang":"es","value":"El acceso a un recurso utilizando un tipo incompatible ('confusión de tipos') en el kernel de gráficos permite que un atacante autorizado ejecute código localmente."}],"metrics":{"cvssMetricV31":[{"source":"secure@microsoft.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"secure@microsoft.com","type":"Secondary","description":[{"lang":"en","value":"CWE-122"},{"lang":"en","value":"CWE-843"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.22621.5768","matchCriteriaId":"B07546D0-ED2A-4B93-83E7-EA808DC39724"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.22631.5768","matchCriteriaId":"49E4DFC9-7EB4-4577-83C0-D1E94C2A8D97"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.26100.4851","matchCriteriaId":"6376F067-CC36-4A7B-914B-0A60EFF1AC48"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.20348.3989","matchCriteriaId":"F752199D-6C01-4D8E-BD6C-3031E5CAED20"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.25398.1791","matchCriteriaId":"94E45649-92F4-4D4C-9D94-275506530222"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.26100.4851","matchCriteriaId":"B75BE97E-C12D-4DFB-B5F2-B8BF90C3E64E"}]}]}],"references":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50176","source":"secure@microsoft.com","tags":["Vendor Advisory"]}]}}]}