RSS   Vulnerabilities for 'High resolution time api'   RSS

2017-02-27
 
CVE-2017-5928

CWE-noinfo
 

 
The W3C High Resolution Time API, as implemented in various web browsers, does not consider that memory-reference times can be measured by a performance.now "Time to Tick" approach even with the https://bugzilla.mozilla.org/show_bug.cgi?id=1167489#c9 protection mechanism in place, which makes it easier for remote attackers to conduct AnC attacks via crafted JavaScript code.

 

 >>> Vendor: W3C 7 Products
Cern httpd
Jigsaw
Libwww
Amaya
Amaya web browser
High resolution time api
Css validator


Copyright 2022, cxsecurity.com

 

Back to Top