Security
Headlines
HeadlinesLatestCVEs

Tag

#Security Vulnerability

CVE-2022-0105: Chromium: CVE-2022-0105 Use after free in PDF

**What is the version information for this release?** Microsoft Edge Version Date Released Based on Chromium Version 97.0.1072.55 1/6/2022 97.0.4692.71

Microsoft Security Response Center
#microsoft#Microsoft Edge (Chromium-based)#Security Vulnerability
CVE-2022-0102: Chromium: CVE-2022-0102 Type Confusion in V8

**What is the version information for this release?** Microsoft Edge Version Date Released Based on Chromium Version 97.0.1072.55 1/6/2022 97.0.4692.71

CVE-2021-4102: Chromium: CVE-2021-4102 Use after free in V8

**What is the version information for this release?** Microsoft Edge Version Date Released Based on Chromium Version 96.0.1054.57 12/14/2021 96.0.4664.110

CVE-2021-4101: Chromium: CVE-2021-4101 Heap buffer overflow in Swiftshader

**What is the version information for this release?** Microsoft Edge Version Date Released Based on Chromium Version 96.0.1054.57 12/14/2021 96.0.4664.110

CVE-2021-4100: Chromium: CVE-2021-4100 Object lifecycle issue in ANGLE

**What is the version information for this release?** Microsoft Edge Version Date Released Based on Chromium Version 96.0.1054.57 12/14/2021 96.0.4664.110

CVE-2021-4099: Chromium: CVE-2021-4099 Use after free in Swiftshader

**What is the version information for this release?** Microsoft Edge Version Date Released Based on Chromium Version 96.0.1054.57 12/14/2021 96.0.4664.110

CVE-2021-4098: Chromium: CVE-2021-4098 Insufficient data validation in Mojo

**What is the version information for this release?** Microsoft Edge Version Date Released Based on Chromium Version 96.0.1054.57 12/14/2021 96.0.4664.110

CVE-2021-43890: Windows AppX Installer Spoofing Vulnerability

Users on the existing Desktop App Installer app can hover over the **Trusted app** text to see more details about the signer. This will help in determining if the app should not be installed.

CVE-2021-43880: Windows Mobile Device Management Elevation of Privilege Vulnerability

**What privileges does the attacker gain?** An attacker would only be able to delete targeted files on a system. They would not gain privileges to view or modify file contents.