{"id":"CVE-2016-5191","details":"Bookmark handling in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android had insufficient validation of supplied data, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via crafted HTML pages, as demonstrated by an interpretation conflict between userinfo and scheme in an http://javascript:payload@example.com URL.","modified":"2026-03-15T22:08:27.623558Z","published":"2016-12-18T03:59:00.460Z","related":["MGASA-2016-0403","SUSE-SU-2016:2597-1","SUSE-SU-2016:2598-1","openSUSE-SU-2016:2597-1","openSUSE-SU-2024:10171-1","openSUSE-SU-2024:12948-1"],"references":[{"type":"WEB","url":"https://codereview.chromium.org/2411473002"},{"type":"WEB","url":"https://crbug.com/639126"},{"type":"WEB","url":"http://www.securityfocus.com/bid/93528"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201610-09"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2067.html"},{"type":"ARTICLE","url":"https://chromereleases.googleblog.com/2016/10/stable-channel-update-for-desktop.html"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"53.0.2785.143"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-5191.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}