### [CVE-2016-5224](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5224) ![](https://img.shields.io/static/v1?label=Product&message=Google%20Chrome%20prior%20to%2055.0.2883.75%20for%20Mac%2C%20Windows%20and%20Linux%2C%20and%2055.0.2883.84%20for%20Android&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=sidechannel%20information%20leakage&color=brighgreen) ### Description A timing attack on denormalized floating point arithmetic in SVG filters in Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to bypass the Same Origin Policy via a crafted HTML page. ### POC #### Reference - http://www.securityfocus.com/bid/94633 - http://www.securityfocus.com/bid/94633 #### Github No PoCs found on GitHub currently.