### [CVE-2016-9066](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9066) ![](https://img.shields.io/static/v1?label=Product&message=Firefox%20ESR&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Firefox&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Thunderbird&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C%2045.5%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3C%2050%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Integer%20overflow%20leading%20to%20a%20buffer%20overflow%20in%20nsScriptLoadHandler&color=brighgreen) ### Description A buffer overflow resulting in a potentially exploitable crash due to memory allocation issues when handling large amounts of incoming data. This vulnerability affects Thunderbird < 45.5, Firefox ESR < 45.5, and Firefox < 50. ### POC #### Reference - https://bugzilla.mozilla.org/show_bug.cgi?id=1299686 #### Github - https://github.com/ZihanYe/web-browser-vulnerabilities - https://github.com/saelo/foxpwn