Known Vulnerabilities for High Resolution Time Api by W3
Listed below are 1 of the newest known vulnerabilities associated with "High Resolution Time Api" by "W3".
These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.
Data on known vulnerable versions is also displayed based on information from known CPEs
Known Vulnerabilities
| CVE | Shortened Description | Severity | Publish Date | Last Modified |
|---|---|---|---|---|
| CVE-2026-21713 json | A flaw in Node.js HMAC verification uses a non-constant-time comparison when validating user-provided signatures, potentially... | Not Provided | 2026-03-30 | 2026-05-10 |
| CVE-2026-5082 json | Amon2::Plugin::Web::CSRFDefender versions from 7.00 through 7.03 for Perl generate an insecure session id. The generate_sess... | Not Provided | 2026-04-08 | 2026-04-08 |
| CVE-2026-3256 json | HTTP::Session versions through 0.53 for Perl defaults to using insecurely generated session ids. HTTP::Session defaults to u... | Not Provided | 2026-03-28 | 2026-04-01 |
| CVE-2025-15604 json | Amon2 versions before 6.17 for Perl use an insecure random_string implementation for security functions. In versions 6.06 th... | Not Provided | 2026-03-28 | 2026-04-01 |
| CVE-2017-5928 json | The W3C High Resolution Time API, as implemented in various web browsers, does not consider that memory-reference times can b... | 3.7 - LOW | 2017-02-27 | 2021-09-13 |