{"id":"CVE-2016-5297","details":"An error in argument length checking in JavaScript, leading to potential integer overflows or other bounds checking issues. This vulnerability affects Thunderbird \u003c 45.5, Firefox ESR \u003c 45.5, and Firefox \u003c 50.","modified":"2026-03-15T22:22:27.593382Z","published":"2018-06-11T21:29:00.747Z","related":["MGASA-2016-0379","MGASA-2016-0409","MGASA-2017-0323","SUSE-SU-2016:3014-1","SUSE-SU-2016:3080-1","SUSE-SU-2016:3105-1","openSUSE-SU-2016:3019-1","openSUSE-SU-2024:10071-1","openSUSE-SU-2024:10230-1","openSUSE-SU-2024:14572-1"],"references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2780.html"},{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2016-93/"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/94336"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1037298"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201701-15"},{"type":"ADVISORY","url":"https://www.debian.org/security/2016/dsa-3730"},{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2016-89/"},{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2016-90/"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1303678"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"45.5.0"}]},{"events":[{"introduced":"0"},{"fixed":"50.0"}]},{"events":[{"introduced":"0"},{"fixed":"45.5.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-5297.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}