{"id":"CVE-2016-9632","details":"An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (global buffer overflow and crash) via a crafted HTML page.","modified":"2026-03-15T14:22:00.070080Z","published":"2016-12-12T02:59:49.347Z","related":["MGASA-2018-0024","SUSE-SU-2016:3046-1","SUSE-SU-2016:3053-1","openSUSE-SU-2024:10235-1"],"references":[{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/11/24/1"},{"type":"FIX","url":"https://github.com/tats/w3m/blob/master/ChangeLog"},{"type":"FIX","url":"https://github.com/tats/w3m/issues/43"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/tats/w3m","events":[{"introduced":"0"},{"last_affected":"8d2c4e9ec6ca3fb268dfe1e4eca72c45daeee2c7"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.5.3-32"}]}}],"versions":["debian/0.1.10+0.1.11pre+kokb23-4","debian/0.3-2.4","debian/0.5.1-1","debian/0.5.1-3","debian/0.5.1-4","debian/0.5.1-5","debian/0.5.1-5.1","debian/0.5.2-1","debian/0.5.2-10","debian/0.5.2-2","debian/0.5.2-2.1","debian/0.5.2-3","debian/0.5.2-4","debian/0.5.2-5","debian/0.5.2-6","debian/0.5.2-7","debian/0.5.2-8","debian/0.5.2-9","debian/0.5.3-1","debian/0.5.3-10","debian/0.5.3-11","debian/0.5.3-12","debian/0.5.3-13","debian/0.5.3-14","debian/0.5.3-15","debian/0.5.3-16","debian/0.5.3-17","debian/0.5.3-18","debian/0.5.3-19","debian/0.5.3-2","debian/0.5.3-20","debian/0.5.3-21","debian/0.5.3-22","debian/0.5.3-23","debian/0.5.3-24","debian/0.5.3-25","debian/0.5.3-26","debian/0.5.3-27","debian/0.5.3-28","debian/0.5.3-29","debian/0.5.3-3","debian/0.5.3-30","debian/0.5.3-31","debian/0.5.3-32","debian/0.5.3-4","debian/0.5.3-5","debian/0.5.3-6","debian/0.5.3-7","debian/0.5.3-8","debian/0.5.3-9","upstream/0.1.10+0.1.11pre+kokb23"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-9632.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}