{"id":"CVE-2016-10226","details":"JavaScriptCore in WebKit, as distributed in Safari Technology Preview Release 18, allows remote attackers to cause a denial of service (bitfield out-of-bounds read and application crash) via crafted JavaScript code that is mishandled in the operatorString function, related to assembler/MacroAssemblerARM64.h, assembler/MacroAssemblerX86Common.h, and wasm/WasmB3IRGenerator.cpp.","modified":"2026-03-14T09:18:11.932432Z","published":"2017-04-03T05:59:00.537Z","references":[{"type":"REPORT","url":"https://bugs.webkit.org/show_bug.cgi?id=165091"},{"type":"REPORT","url":"https://trac.webkit.org/changeset/209295"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"18"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-10226.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}