edr

  1. CVE-2025-50155: Local Privilege Escalation in Windows Push Notifications (Type Confusion)

    Microsoft’s Security Response Center (MSRC) has cataloged CVE-2025-50155 as an Elevation of Privilege (EoP) vulnerability in the Windows Push Notifications Apps component described as “Access of resource using incompatible type (‘type confusion’).” The issue allows an authorized local attacker —...
  2. CVE-2025-53779: Kerberos Relative Path Traversal — Urgent Patch Guide

    Microsoft’s security advisory confirms a new Kerberos vulnerability — CVE-2025-53779 — described as a relative path traversal flaw in Windows Kerberos that can be abused by an authorized attacker over a network to elevate privileges, and organizations that rely on Kerberos-based authentication...
  3. Windows Security App Spoofing Flaw (CVE-2025-47956): Mitigation Guide

    Microsoft security telemetry and third‑party trackers identify a newly disclosed spoofing flaw in the Windows Security App that lets a locally authorized user manipulate file names or paths and present forged or misleading security UI and alerts — a vulnerability cataloged publicly under the...
  4. CVE-2025-53740: Office Use-After-Free RCE — Urgent Patch & Defenses

    CVE-2025-53740 — Microsoft Office “use‑after‑free” (local code execution) An in‑depth feature for security teams, admins and threat hunters Summary (tl;dr) CVE-2025-53740 is reported by Microsoft as a use‑after‑free (CWE‑416) memory‑corruption flaw in Microsoft Office that can allow an attacker...
  5. CVE-2025-53739: Excel Type-Confusion RCE — Mitigation and Patch Guide

    Microsoft’s Security Response Center has published an advisory listing CVE-2025-53739 — an Excel vulnerability described as “Access of resource using incompatible type (‘type confusion’)” that can lead to code execution when a crafted spreadsheet is processed by the desktop client...
  6. CVE-2025-53734: Visio Use-After-Free RCE - Patch Now to Prevent Exploitation

    Microsoft has confirmed a use‑after‑free vulnerability in Microsoft Office Visio — tracked as CVE‑2025‑53734 — that can be triggered when a user opens a specially crafted Visio file and may allow an attacker to execute code in the context of the current user; Microsoft’s advisory entry is live...
  7. CVE-2025-53736: Word Buffer Over-Read Information Disclosure—Patch Now

    Microsoft’s Security Update Guide lists CVE-2025-53736 as a Microsoft Word information-disclosure vulnerability caused by a buffer over-read in Word that can allow an unauthorized local actor to read memory and disclose sensitive information on a victim machine; administrators are strongly...
  8. Excel CVE-2025-53735 Use-After-Free: Patch Now to Block Local Code Execution

    Microsoft has confirmed a use‑after‑free vulnerability in Microsoft Excel (tracked as CVE‑2025‑53735) that can lead to local code execution when a crafted spreadsheet is opened — a serious document‑based attack vector that demands immediate attention from IT teams and security‑minded users...
  9. CVE-2025-53733: Word RCE via Numeric Type Conversion

    Headline: CVE-2025-53733 — What you need to know about the new Microsoft Word RCE caused by incorrect numeric conversions Lede: Microsoft has published advisory CVE-2025-53733 for a remote‑code‑execution class bug in Microsoft Office Word described as an “incorrect conversion between numeric...
  10. CVE-2025-53732: Microsoft Office Heap Overflow — RCE, Detection & Patching

    Below is a detailed Markdown article about CVE-2025-53732 (Microsoft Office — heap-based buffer overflow → remote code execution). It explains what the vulnerability is, how it can be abused, the likely impact, tactical detection and hunting guidance, step-by-step mitigation and patching...
  11. CVE-2025-53731: Office Use-After-Free RCE and Patch Guide

    Microsoft’s Security Response Center has cataloged CVE-2025-53731 as a memory corruption vulnerability in Microsoft Office — a use-after-free bug that can allow an attacker to execute code locally on an affected system when a specially crafted Office file is processed. The advisory classifies...
  12. CVE-2025-53726: Patch Windows Push Notifications Type-Confusion Privilege Escalation

    Microsoft’s advisory for CVE-2025-53726 warns that a type‑confusion bug in the Windows Push Notifications stack can allow an authorized local user to elevate privileges to SYSTEM, and administrators must treat the advisory as a high‑priority patching item while hardening detection and...
  13. CVE-2025-48000: Patch Windows CDPSvc UAF Privilege Escalation Now

    CVE-2025-48000 (note on numbering) — Windows Connected Devices Platform Service: use‑after‑free Elevation‑of‑Privilege Subtitle: Patch now — local authenticated attackers can escalate to SYSTEM via CDPSvc memory corruption Byline: Jane Doe — Senior Security Reporter, WindowsForum.com Short...
  14. CVE-2025-53718: Windows AFD.sys UAF Privilege Escalation — Patch, Detect, Harden

    Microsoft’s Security Update Guide entry for CVE-2025-53718 describes a use‑after‑free (UAF) flaw in the Windows Ancillary Function Driver for WinSock (AFD.sys) that can be triggered by a locally authorized user to obtain elevated privileges on affected Windows hosts — a kernel‑level...
  15. CVE-2025-53716: Patch LSASS DoS Now to Protect Domain Controllers

    Title: New LSASS DoS (CVE-2025-53716) — What admins need to know now By WindowsForum.com security desk — August 12, 2025 Summary A null-pointer dereference vulnerability in the Windows Local Security Authority Subsystem Service (LSASS) — tracked as CVE-2025-53716 in Microsoft’s Security Update...
  16. KB5064010 Hotpatch for Windows 11 LTSC 2024: reboot-free security fixes

    Microsoft released KB5064010 on August 12, 2025 — a hotpatch targeted at Windows 11 Enterprise LTSC 2024 (OS Build 26100.4851) that delivers a focused set of security fixes designed to take effect without the usual reboot required by standard cumulative updates. (support.microsoft.com)...
  17. Windows Storage Port Driver Info Disclosure: Patch June 2025 (CVE-2025-32722)

    Note: I couldn’t find any authoritative record for CVE-2025-53156 in the major public vulnerability databases (MSRC / NVD / MITRE / CVE.circl / CVE Details) as of August 12, 2025. The Storage Port Driver information-disclosure vulnerability widely reported in Microsoft’s June 2025 updates is...
  18. AFD.sys Null Pointer Dereference: Local EoP to SYSTEM - Patch Now

    Microsoft’s Security Response Guide flags a null-pointer dereference in the Windows Ancillary Function Driver for WinSock (AFD.sys) that, when reached by a local, authorized user, can be weaponized into an elevation‑of‑privilege to SYSTEM — a high‑impact kernel vulnerability that demands...
  19. Windows Kernel Use-After-Free CVE-2025-53151: Patch Now to Prevent Privilege Escalation

    Microsoft’s Security Update Guide lists CVE‑2025‑53151 as a use‑after‑free vulnerability in the Windows kernel that can be abused by an authorized local user to elevate privileges on an affected system, and Microsoft’s published advisory directs administrators to install the supplied security...
  20. Patch Windows Kernel Streaming WOW Thunk (ks.sys) LPE: Heap Overflow Risk

    Microsoft has released patches for a kernel-mode flaw in the Kernel Streaming WOW Thunk Service Driver—an exploitable heap-based buffer overflow that can allow a locally authorized attacker to escalate privileges to SYSTEM—though the CVE identifier you supplied (CVE-2025-53149) does not appear...