{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T15:20:43.836","vulnerabilities":[{"cve":{"id":"CVE-2026-21232","sourceIdentifier":"secure@microsoft.com","published":"2026-02-10T18:16:23.770","lastModified":"2026-02-11T21:12:11.617","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Untrusted pointer dereference in Windows HTTP.sys allows an authorized attacker to elevate privileges locally."},{"lang":"es","value":"Desreferencia de puntero no confiable en Windows HTTP.sys permite a un atacante autorizado elevar privilegios localmente."}],"metrics":{"cvssMetricV31":[{"source":"secure@microsoft.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"secure@microsoft.com","type":"Secondary","description":[{"lang":"en","value":"CWE-822"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*","versionEndExcluding":"10.0.22631.6649","matchCriteriaId":"B273EF5A-3157-4842-AE91-CEC289813902"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*","versionEndExcluding":"10.0.22631.6649","matchCriteriaId":"CD2513FC-D399-4DBF-921F-13B4D1497127"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*","versionEndExcluding":"10.0.26100.7781","matchCriteriaId":"B08450A0-0F7E-4A05-8989-900221992766"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*","versionEndExcluding":"10.0.26100.7781","matchCriteriaId":"9D30B348-DAE7-43EC-85FA-38E1715258A9"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_11_25h2:*:*:*:*:*:*:arm64:*","versionEndExcluding":"10.0.26200.7781","matchCriteriaId":"8F23FFCF-9C69-4D27-AF21-D09A6041AA3A"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_11_25h2:*:*:*:*:*:*:x64:*","versionEndExcluding":"10.0.26200.7781","matchCriteriaId":"D1D93202-BDDB-438F-934E-1FE904B3651B"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.25398.2149","matchCriteriaId":"F0EA3C51-C3FE-494A-92D9-D3B1C301CB54"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.26100.32313","matchCriteriaId":"33AF95F4-504F-40EF-9F64-5D6F7B40114F"}]}]}],"references":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21232","source":"secure@microsoft.com","tags":["Vendor Advisory"]}]}}]}