use-after-free

  1. CVE-2025-10200: Chrome ServiceWorker UAF – Patch Now to Prevent Exploitation

    A newly assigned Chromium vulnerability, CVE-2025-10200, is a use‑after‑free flaw in the ServiceWorker implementation that Google patched in its September stable updates; the bug allows a remote attacker, by luring a user to a crafted page, to trigger heap corruption and potentially achieve...
  2. Urgent Patch Required: CVE-2025-54912 BitLocker Kernel UAF Privilege Escalation

    Microsoft’s security advisory confirms a use‑after‑free defect in the BitLocker stack that can be triggered by an authorized local user to escalate privileges on affected Windows systems — administrators must treat CVE‑2025‑54912 as an urgent patching priority and assume a high‑impact threat...
  3. CVE-2025-54911: High-Impact BitLocker Local Privilege Escalation (UAF)

    Microsoft’s security update guide lists CVE‑2025‑54911 as a use‑after‑free defect in Windows BitLocker that can be triggered by an authorized local user to elevate privileges on affected machines, creating a high‑impact local elevation‑of‑privilege risk that administrators must treat as urgent...
  4. CVE-2025-54112: Local Privilege Escalation in VHD/VHDX Parsing

    Microsoft’s Security Response Guide lists CVE-2025-54112 as a vulnerability in the Microsoft Virtual Hard Disk (VHD/VHDX) handling code that can be abused by an authorized local attacker to achieve elevation of privilege on Windows hosts, a condition vendors and incident responders classify as...
  5. CVE-2025-54105: Local Elevation of Privilege in Microsoft BFS (Brokering File System)

    Microsoft has published an advisory for CVE-2025-54105 — a local elevation-of-privilege vulnerability in the Microsoft Brokering File System (BFS) caused by a concurrency bug (race condition) that can be exploited by an authenticated local user to gain elevated rights on the host...
  6. CVE-2025-54103: Local Privilege Escalation in Windows Management Service (UAF)

    Microsoft’s Security Response Center (MSRC) has published an advisory for CVE-2025-54103 describing a use‑after‑free flaw in the Windows Management Service that can allow an unauthorized local user to elevate privileges on a vulnerable host. The vendor-classification marks this as an...
  7. CVE-2025-27490: Windows Bluetooth Privilege Escalation - Threats, Fixes & Detection

    Thanks — quick clarification before I write the full article: I followed the MSRC link you gave (Security Update Guide - Microsoft Security Response Center) and reached Microsoft’s Security Update Guide entry for that identifier. (msrc.microsoft.com) However, public vulnerability trackers and...
  8. PowerPoint Use-After-Free Risks (2025): Verification Gaps, Mitigations, and Defender Playbook

    Microsoft’s advisory link for CVE-2025-54908 points to a PowerPoint use‑after‑free that “allows an unauthorized attacker to execute code locally,” but that specific CVE number could not be corroborated in public vulnerability trackers at the time of verification; when attempting to load the...
  9. CVE-2025-54904: Excel Use-After-Free Could Allow Local Code Execution

    Microsoft's advisory confirms a use‑after‑free flaw in Microsoft Excel that can lead to local code execution when a specially crafted spreadsheet is opened, creating a potentially serious escalation path on unpatched systems. (msrc.microsoft.com) Overview This vulnerability, tracked as...
  10. CVE-2025-54903: Excel Use-After-Free Local RCE — Patch Now

    Microsoft has published an advisory for CVE-2025-54903, a use‑after‑free vulnerability in Microsoft Excel that can lead to local code execution when a victim opens a specially crafted spreadsheet — a document‑based remote code execution (RCE) risk that should be treated as high priority for both...
  11. CVE-2025-54896: Excel Use-After-Free RCE — Patch Now

    Microsoft has published an advisory for CVE-2025-54896: a use-after-free vulnerability in Microsoft Office Excel that, when exploited via a specially crafted workbook, can lead to code execution in the context of the user who opens the file. This class of bug is a recurring and high-consequence...
  12. CVE-2025-54111: Local Privilege Escalation in Windows DatePickerFlyout (UI XAML)

    CVE-2025-54111 — Windows UI XAML Phone DatePickerFlyout: Use‑After‑Free Leads to Local Privilege Escalation By [Your Name], WindowsForum.com — Sep 9, 2025 Summary Microsoft has assigned CVE‑2025‑54111 to a use‑after‑free vulnerability in the Windows UI XAML Phone DatePickerFlyout control. The...
  13. Windows CDPSvc Use-After-Free Elevation to SYSTEM (CVE-2025-54102) – Patch Now

    A use‑after‑free vulnerability in the Windows Connected Devices Platform Service (CDPSvc) has been cataloged by Microsoft as an elevation‑of‑privilege issue that can let an authorized, local attacker escalate to SYSTEM, and administrators should treat it as a high‑priority patching item while...
  14. CVE-2025-54101: Remediation for Windows SMBv3 Client Use-After-Free RCE

    Microsoft’s advisory identifies CVE-2025-54101 as a use‑after‑free vulnerability in the Windows SMBv3 Client that can be triggered over a network and may allow an attacker to execute arbitrary code in the context of the affected process. This is a serious client‑side remote code execution (RCE)...
  15. Chrome 140 Security Update: High-Severity V8 Use-After-Free CVE-2025-9864

    Chrome’s September security update closes a high-severity use-after-free vulnerability in the V8 JavaScript engine — tracked as CVE-2025-9864 — that could allow an attacker to corrupt memory and potentially achieve remote code execution through a crafted web page, and administrators of...
  16. Chrome Aura Use-After-Free CVE-2025-8882 Patch Now

    A recently disclosed memory-safety flaw in Chromium’s Aura windowing component — tracked as CVE-2025-8882 — allows a remote attacker who can trick a user into specific UI gestures to trigger a use‑after‑free that may lead to heap corruption; the bug was patched upstream in Google Chrome...
  17. CISA Adds Three Exploited CVEs to KEV Catalog: IE, Excel, WinRAR (2025)

    CISA’s latest update places three long‑standing and newly discovered flaws squarely in the crosshairs of enterprise defenders, adding CVE‑2013‑3893 (Internet Explorer), CVE‑2007‑0671 (Microsoft Excel), and CVE‑2025‑8088 (WinRAR) to the agency’s Known Exploited Vulnerabilities (KEV) Catalog on...
  18. Word CVE-2025-53784 Use-After-Free: Local RCE in Documents

    A newly disclosed memory-corruption flaw in Microsoft Word—tracked as CVE-2025-53784—has been classified as a use-after-free vulnerability that can allow an attacker to execute code locally when a victim opens or previews a specially crafted document. Microsoft’s Security Update Guide lists this...
  19. CVE-2025-53740: Office Use-After-Free RCE — Urgent Patch & Defenses

    CVE-2025-53740 — Microsoft Office “use‑after‑free” (local code execution) An in‑depth feature for security teams, admins and threat hunters Summary (tl;dr) CVE-2025-53740 is reported by Microsoft as a use‑after‑free (CWE‑416) memory‑corruption flaw in Microsoft Office that can allow an attacker...
  20. Microsoft Word Use-After-Free RCE in 2025: CVE-2025-47957 Explained

    I can write that feature article, but a quick verification step first — I could not find any public record for CVE‑2025‑53738 in Microsoft’s Update Guide, NVD, MITRE or other CVE aggregators. I did search MSRC (the link you provided requires JavaScript to render) and public databases for that...