Versions Packages Information History CVEs Related Badges Report

Versions for w3m

170 package(s) known

Repository Package name Version Category Maintainer(s)
Adélie Linux current
user
w3m 0.5.3_git20190105 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
w3m-lang 0.5.3_git20190105 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
w3m-dbg 0.5.3_git20190105 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
w3m-doc 0.5.3_git20190105 Potentially vulnerable - awilfox@adelielinux.org
Alpine Linux 3.8
community
w3m-doc 0.5.3.20180125 - scrumpyjack@st.ilet.to
Alpine Linux 3.8
community
w3m 0.5.3.20180125 - scrumpyjack@st.ilet.to
Alpine Linux 3.9
community
w3m 0.5.3.20180125 - scrumpyjack@st.ilet.to
Alpine Linux 3.9
community
w3m-doc 0.5.3.20180125 - scrumpyjack@st.ilet.to
Alpine Linux 3.10
community
w3m 0.5.3.20180125 - scrumpyjack@st.ilet.to
Alpine Linux 3.10
community
w3m-doc 0.5.3.20180125 - scrumpyjack@st.ilet.to
Alpine Linux 3.11
community
w3m 0.5.3.20180125 - scrumpyjack@st.ilet.to
Alpine Linux 3.11
community
w3m-doc 0.5.3.20180125 - scrumpyjack@st.ilet.to
Alpine Linux 3.12
community
w3m 0.5.3.20180125 - scrumpyjack@st.ilet.to
Alpine Linux 3.12
community
w3m-doc 0.5.3.20180125 - scrumpyjack@st.ilet.to
Alpine Linux 3.13
community
w3m 0.5.3.20200502 - scrumpyjack@st.ilet.to
Alpine Linux 3.13
community
w3m-doc 0.5.3.20200502 - scrumpyjack@st.ilet.to
Alpine Linux 3.14
community
w3m-doc 0.5.3.20210102 - scrumpyjack@st.ilet.to
Alpine Linux 3.14
community
w3m 0.5.3.20210102 - scrumpyjack@st.ilet.to
Alpine Linux Edge
community
w3m 0.5.3.20210102 - scrumpyjack@st.ilet.to
Alpine Linux Edge
community
w3m-doc 0.5.3.20210102 - scrumpyjack@st.ilet.to
ALT Linux p9 w3m 0.5.3 Potentially vulnerable Networking/WWW darktemplar@altlinux.org
ALT Linux p10 w3m 0.5.3 Potentially vulnerable Networking/WWW vseleznv@altlinux.org
ALT Sisyphus w3m 0.5.3 Potentially vulnerable Networking/WWW vseleznv@altlinux.org
Amazon Linux 1
main
w3m 0.5.2 Potentially vulnerable Applications/Internet -
AOSC w3m 0.5.3+git20190105 Potentially vulnerable web fallback-mnt-aosc@repology
Apertis v2020
v2020/development
w3m 0.5.3 Potentially vulnerable main tats@debian.org, dai@debian.org
Apertis v2021
v2021/development
w3m 0.5.3 Potentially vulnerable main tats@debian.org, dai@debian.org
Apertis v2022 Development
v2022dev2/development
w3m 0.5.3git20210102 Potentially vulnerable main tats@debian.org, dai@debian.org
Arch
extra
w3m 0.5.3.git20210102_6 Potentially vulnerable - -
Artix
world
w3m 0.5.3.git20210102_6 Potentially vulnerable - -
Astra Orel Stable
main
w3m 0.5.3 Potentially vulnerable web tats@debian.org, dai@debian.org
Astra Orel Current
main
w3m 0.5.3 Potentially vulnerable web tats@debian.org, dai@debian.org
CentOS 6
os
w3m 0.5.2 Potentially vulnerable Applications/Internet -
Chakra
desktop
w3m 0.5.3.git20170102 Potentially vulnerable - -
CRUX 3.4
opt
w3m 0.5.3 Potentially vulnerable - tek@serverop.de
CRUX 3.5
opt
w3m 0.5.3-37 - tek@serverop.de
CRUX 3.6
opt
w3m 0.5.3-38 - crux@romster.me
Cygwin w3m 0.5.3 Potentially vulnerable Web orphaned@cygwin
Cygwin w3m-debuginfo 0.5.3 Potentially vulnerable Debug orphaned@cygwin
Debian 8
jessie/main
w3m 0.5.3 Potentially vulnerable web tats@debian.org, dai@debian.org
Debian 9
stretch/main
w3m 0.5.3 Potentially vulnerable web tats@debian.org, dai@debian.org
Debian 10
buster/main
w3m 0.5.3 Potentially vulnerable web tats@debian.org, dai@debian.org
Debian 11
bullseye/main
w3m 0.5.3git20210102 Potentially vulnerable web tats@debian.org, dai@debian.org
Debian 12
bookworm/main
w3m 0.5.3git20210102 Potentially vulnerable web tats@debian.org, dai@debian.org
Debian Stable
stable/main
w3m 0.5.3git20210102 Potentially vulnerable web tats@debian.org, dai@debian.org
Debian Testing
testing/main
w3m 0.5.3git20210102 Potentially vulnerable web tats@debian.org, dai@debian.org
Debian Unstable
sid/main
w3m 0.5.3git20210102 Potentially vulnerable web tats@debian.org, dai@debian.org
Deepin
main
w3m 0.5.3 Potentially vulnerable web tats@debian.org, dai@debian.org
Devuan 1.0 (Jessie)
jessie/main
w3m 0.5.3 Potentially vulnerable web tats@debian.org, dai@debian.org
Devuan 2.0 (ASCII)
ascii/main
w3m 0.5.3 Potentially vulnerable web tats@debian.org, dai@debian.org
Devuan 3.0 (Beowulf)
beowulf/main
w3m 0.5.3 Potentially vulnerable web tats@debian.org, dai@debian.org
Devuan 4.0 (Chimaera)
chimaera/main
w3m 0.5.3git20210102 Potentially vulnerable web tats@debian.org, dai@debian.org
Devuan Unstable
unstable/main
w3m 0.5.3git20210102 Potentially vulnerable web tats@debian.org, dai@debian.org
DPorts japanese/w3m 0.5.3.20210424 japanese nobutaka@freebsd.org
DPorts www/w3m 0.5.3.20210424 www nobutaka@freebsd.org
EPEL 7 w3m 0.5.3 Potentially vulnerable Unspecified -
EPEL 8 w3m 0.5.3 Potentially vulnerable Unspecified -
Exherbo
net
net-www/w3m 0.5.3 Potentially vulnerable net-www fallback-mnt-exherbo@repology
Fedora 26
release
w3m 0.5.3 Potentially vulnerable Unspecified -
Fedora 27
release
w3m 0.5.3 Potentially vulnerable Unspecified -
Fedora 27
updates
w3m 0.5.3 Potentially vulnerable Unspecified -
Fedora 28
release
w3m 0.5.3 Potentially vulnerable Unspecified -
Fedora 29
release
w3m 0.5.3 Potentially vulnerable Unspecified -
Fedora 30
release
w3m 0.5.3 Potentially vulnerable Unspecified -
Fedora 30
updates
w3m 0.5.3 Potentially vulnerable Unspecified -
Fedora 31
release
w3m 0.5.3 Potentially vulnerable Unspecified -
Fedora 31
updates
w3m 0.5.3 Potentially vulnerable Unspecified -
Fedora 32
release
w3m 0.5.3 Potentially vulnerable Unspecified -
Fedora 32
updates
w3m 0.5.3 Potentially vulnerable Unspecified -
Fedora 33
updates
w3m 0.5.3 Potentially vulnerable Unspecified -
Fedora 33
release
w3m 0.5.3 Potentially vulnerable Unspecified -
Fedora 34
release
w3m 0.5.3 Potentially vulnerable Unspecified -
Fedora Rawhide w3m 0.5.3 Potentially vulnerable Unspecified -
FreeBSD Ports www/w3m 0.5.3.20210905 www nobutaka@freebsd.org
FreeBSD Ports japanese/w3m 0.5.3.20210905 japanese nobutaka@freebsd.org
Gentoo www-client/w3m 0.5.3_p20210102 Potentially vulnerable www-client cjk@gentoo.org
Gentoo www-client/w3m 0.5.3_p20190105 Potentially vulnerable www-client cjk@gentoo.org
Gentoo www-client/w3m 0.5.3_p20180125 Potentially vulnerable www-client cjk@gentoo.org
GNU Guix w3m 0.5.3+git20200502 Potentially vulnerable - -
GoboLinux W3M 0.5.2 Potentially vulnerable - -
HaikuPorts master www-client/w3m 0.5.3~git20200502 Potentially vulnerable www-client -
Homebrew w3m 0.5.3 Potentially vulnerable - -
HP-UX 11.31
ia64_64
w3m 0.5.3 Potentially vulnerable - -
HP-UX 11.31
hppa_32
w3m 0.5.3 Potentially vulnerable - -
HP-UX 11.31
ia64_32
w3m 0.5.3 Potentially vulnerable - -
Kali Linux Rolling
main
w3m 0.5.3git20210102 Potentially vulnerable web tats@debian.org, dai@debian.org
KaOS
apps
w3m 0.5.3git20210102.6 Potentially vulnerable - demm@kaosx.us
LiGurOS stable www-client/w3m 0.5.3_p20190105 Potentially vulnerable www-client dev@liguros.net, cjk@gentoo.org
LiGurOS stable www-client/w3m 0.5.3_p37 Potentially vulnerable www-client dev@liguros.net, cjk@gentoo.org
LiGurOS develop www-client/w3m 0.5.3_p20190105 Potentially vulnerable www-client dev@liguros.net, cjk@gentoo.org
LiGurOS develop www-client/w3m 0.5.3_p37 Potentially vulnerable www-client dev@liguros.net, cjk@gentoo.org
Linuxbrew w3m 0.5.3 Potentially vulnerable - -
MacPorts w3m-devel 20200823 www nomaintainer@macports.org
MacPorts w3m 0.5.3-38 www nomaintainer@macports.org
Mageia 7
core/release
w3m 0.5.3 Potentially vulnerable Networking/WWW -
Mageia 8
core/release
w3m 0.5.3 Potentially vulnerable Networking/WWW -
Mageia Cauldron
core/release
w3m 0.5.3 Potentially vulnerable Networking/WWW -
Manjaro Stable
extra
w3m 0.5.3.git20210102_6 Potentially vulnerable - -
Manjaro Testing
extra
w3m 0.5.3.git20210102_6 Potentially vulnerable - -
Manjaro Unstable
extra
w3m 0.5.3.git20210102_6 Potentially vulnerable - -
MidnightBSD mports www/w3m 0.5.3.20210206 www -
MSYS2 msys2
x86_64
w3m 0.5.3+20180125 net-utils alexpux@gmail.com
MSYS2 msys2
i686
w3m 0.5.3+20180125 net-utils alexpux@gmail.com
nixpkgs stable 21.05 w3m 0.5.3+git20190105 Potentially vulnerable - charles@cstrahan.com
nixpkgs stable 21.05 w3m 0.5.3+git20190105 Potentially vulnerable - charles@cstrahan.com
nixpkgs stable 21.05 w3m 0.5.3+git20190105 Potentially vulnerable - charles@cstrahan.com
nixpkgs stable 21.05 w3m 0.5.3+git20190105 Potentially vulnerable - charles@cstrahan.com
nixpkgs unstable w3m 0.5.3+git20190105 Potentially vulnerable - charles@cstrahan.com
nixpkgs unstable w3m 0.5.3+git20190105 Potentially vulnerable - charles@cstrahan.com
nixpkgs unstable w3m 0.5.3+git20190105 Potentially vulnerable - charles@cstrahan.com
nixpkgs unstable w3m 0.5.3+git20190105 Potentially vulnerable - charles@cstrahan.com
OpenBSD Ports www/w3m 0.5.3pl20210102 Potentially vulnerable www ports@openbsd.org
OpenBSD Ports www/w3m 0.5.3pl20210102 Potentially vulnerable www ports@openbsd.org
OpenIndiana packages
hipster
w3m 0.5.3 Potentially vulnerable Applications/Internet -
OpenPKG w3m 0.5.3 Potentially vulnerable Web -
openSUSE Leap 42.3
main/oss
w3m 0.5.3.git20161120 Potentially vulnerable Productivity/Networking/Web/Browsers -
openSUSE Leap 42.3
updates/oss
w3m 0.5.3.git20161120 Potentially vulnerable Productivity/Networking/Web/Browsers -
openSUSE Leap 15.0
main/oss
w3m 0.5.3 Potentially vulnerable Productivity/Networking/Web/Browsers -
openSUSE Leap 15.1
main/oss
w3m 0.5.3 Potentially vulnerable Productivity/Networking/Web/Browsers -
openSUSE Leap 15.2
main/oss
w3m 0.5.3 Potentially vulnerable Productivity/Networking/Web/Browsers -
openSUSE Leap 15.3
main/oss
w3m 0.5.3 Potentially vulnerable Productivity/Networking/Web/Browsers -
openSUSE Tumbleweed
src-oss
w3m 0.5.3 Potentially vulnerable Productivity/Networking/Web/Browsers -
openSUSE Network Tumbleweed w3m 0.5.3 Potentially vulnerable Productivity/Networking/Web/Browsers -
Parabola
extra
w3m 0.5.3.git20210102_6 Potentially vulnerable - -
Pardus 17
main
w3m 0.5.3 Potentially vulnerable web tats@debian.org, dai@debian.org
Pardus 19
main
w3m 0.5.3 Potentially vulnerable web tats@debian.org, dai@debian.org
Pardus 21
main
w3m 0.5.3git20210102 Potentially vulnerable web tats@debian.org, dai@debian.org
Parrot
main
w3m 0.5.3git20210102 Potentially vulnerable web tats@debian.org, dai@debian.org
PCLinuxOS w3m 0.5.3 Potentially vulnerable Networking/WWW -
pkgsrc current www/w3m 0.5.3.0.20210102 Potentially vulnerable www uebayasi@netbsd.org
PLD Linux w3m 0.5.3 Potentially vulnerable - -
PureOS Amber w3m 0.5.3 Potentially vulnerable misc tats@debian.org, dai@debian.org
PureOS landing w3m 0.5.3git20210102 Potentially vulnerable misc tats@debian.org, dai@debian.org
Raspbian Oldstable
main
w3m 0.5.3 Potentially vulnerable web tats@debian.org, dai@debian.org
Raspbian Stable
main
w3m 0.5.3git20210102 Potentially vulnerable web tats@debian.org, dai@debian.org
Raspbian Testing
main
w3m 0.5.3git20210102 Potentially vulnerable web tats@debian.org, dai@debian.org
Ravenports w3m 0.5.3 Potentially vulnerable www fallback-mnt-ravenports@repology
Rosa 2014.1
contrib/release
w3m 0.5.3 Potentially vulnerable - -
Rosa 2014.1
contrib/updates
w3m 0.5.3 Potentially vulnerable - -
Rosa 2016.1
contrib/release
w3m 0.5.3 Potentially vulnerable - -
Rosa 2016.1
contrib/updates
w3m 0.5.3 Potentially vulnerable - -
Rosa 2019.1
contrib/release
w3m 0.5.3 Potentially vulnerable Networking/WWW m.novosyolov@rosalinux.ru
Rosa Server 6.9
base/release
w3m 0.5.2 Potentially vulnerable Applications/Internet andrew.lukoshko@rosalab.ru
SlackBuilds network/w3m 0.5.3_37 network dave@slackbuilds.org
SliTaz Cooking w3m 0.5.3 Potentially vulnerable network mojo@slitaz.org
SliTaz Next w3m 0.5.3 Potentially vulnerable network mojo@slitaz.org
Solus w3m 0.5.3.20200502 network.web.browser flinux@vongellhorn.ch
Solus w3m-dbginfo 0.5.3.20200502 debug flinux@vongellhorn.ch
Spack w3m 0.5.3 Potentially vulnerable - ronin_gw@spack
T2 SDE w3m 0.5.3 Potentially vulnerable extra/office t2@t2-project.org
Termux w3m 0.5.3.20190105 - termux@termux
Trisquel 6.0
toutatis/main
w3m 0.5.3 Potentially vulnerable text tats@debian.org, debian@vdr.jp
Trisquel 6.0
toutatis-updates/main
w3m 0.5.3 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, debian@vdr.jp
Trisquel 7.0
belenos/main
w3m 0.5.3 Potentially vulnerable text tats@debian.org, dai@debian.org
Trisquel 7.0
belenos-updates/main
w3m 0.5.3 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dai@debian.org
Trisquel 8.0
flidas/main
w3m 0.5.3 Potentially vulnerable universe/text tats@debian.org, dai@debian.org
Trisquel 8.0
flidas-updates/main
w3m 0.5.3 Potentially vulnerable universe/text ubuntu-devel-discuss@lists.ubuntu.com, dai@debian.org
Trisquel 9.0
etiona/main
w3m 0.5.3 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dai@debian.org
Ubuntu 14.04
trusty/main
w3m 0.5.3 Potentially vulnerable text tats@debian.org, dai@debian.org
Ubuntu 14.04
trusty-updates/main
w3m 0.5.3 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dai@debian.org
Ubuntu 16.04
xenial/universe
w3m 0.5.3 Potentially vulnerable universe/text tats@debian.org, dai@debian.org
Ubuntu 16.04
xenial-updates/universe
w3m 0.5.3 Potentially vulnerable universe/text ubuntu-devel-discuss@lists.ubuntu.com, dai@debian.org
Ubuntu 18.04
bionic/main
w3m 0.5.3 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dai@debian.org
Ubuntu 20.04
focal/main
w3m 0.5.3 Potentially vulnerable text tats@debian.org, dai@debian.org
Ubuntu 20.10
groovy/main
w3m 0.5.3 Potentially vulnerable text tats@debian.org, dai@debian.org
Ubuntu 21.04
hirsute/main
w3m 0.5.3git20210102 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dai@debian.org
Ubuntu 21.10
impish/main
w3m 0.5.3git20210102 Potentially vulnerable text tats@debian.org, dai@debian.org
Void Linux x86_64
x86_64
w3m 0.5.3+git20210102 Potentially vulnerable - congdanhqx@gmail.com
Void Linux x86_64
x86_64
w3m-img 0.5.3+git20210102 Potentially vulnerable - congdanhqx@gmail.com
Wikidata w3m 0.5.3 Potentially vulnerable - -