Versions Packages Information History CVEs Related Badges Report

Versions for w3m

216 package(s) known

Repository Package name Version Category Maintainer(s)
Adélie Linux current
user
w3m 0.5.3_git20190105 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
w3m-dbg 0.5.3_git20190105 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
w3m-doc 0.5.3_git20190105 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
w3m-lang 0.5.3_git20190105 Potentially vulnerable - awilfox@adelielinux.org
Alpine Linux 3.8
community
w3m-doc 0.5.3.20180125 - scrumpyjack@st.ilet.to
Alpine Linux 3.8
community
w3m 0.5.3.20180125 - scrumpyjack@st.ilet.to
Alpine Linux 3.9
community
w3m 0.5.3.20180125 - scrumpyjack@st.ilet.to
Alpine Linux 3.9
community
w3m-doc 0.5.3.20180125 - scrumpyjack@st.ilet.to
Alpine Linux 3.10
community
w3m 0.5.3.20180125 - scrumpyjack@st.ilet.to
Alpine Linux 3.10
community
w3m-doc 0.5.3.20180125 - scrumpyjack@st.ilet.to
Alpine Linux 3.11
community
w3m 0.5.3.20180125 - scrumpyjack@st.ilet.to
Alpine Linux 3.11
community
w3m-doc 0.5.3.20180125 - scrumpyjack@st.ilet.to
Alpine Linux 3.12
community
w3m 0.5.3.20180125 - scrumpyjack@st.ilet.to
Alpine Linux 3.12
community
w3m-doc 0.5.3.20180125 - scrumpyjack@st.ilet.to
Alpine Linux 3.13
community
w3m 0.5.3.20200502 - scrumpyjack@st.ilet.to
Alpine Linux 3.13
community
w3m-doc 0.5.3.20200502 - scrumpyjack@st.ilet.to
Alpine Linux 3.14
community
w3m-doc 0.5.3.20210102 - scrumpyjack@st.ilet.to
Alpine Linux 3.14
community
w3m 0.5.3.20210102 - scrumpyjack@st.ilet.to
Alpine Linux 3.15
community
w3m 0.5.3.20210102 - scrumpyjack@st.ilet.to
Alpine Linux 3.15
community
w3m-doc 0.5.3.20210102 - scrumpyjack@st.ilet.to
Alpine Linux 3.16
community
w3m-image 0.5.3.20220429 - scrumpyjack@st.ilet.to
Alpine Linux 3.16
community
w3m-perl 0.5.3.20220429 - scrumpyjack@st.ilet.to
Alpine Linux 3.16
community
w3m-doc 0.5.3.20220429 - scrumpyjack@st.ilet.to
Alpine Linux 3.16
community
w3m 0.5.3.20220429 - scrumpyjack@st.ilet.to
Alpine Linux 3.17
community
w3m-doc 0.5.3.20220429 - scrumpyjack@st.ilet.to
Alpine Linux 3.17
community
w3m 0.5.3.20220429 - scrumpyjack@st.ilet.to
Alpine Linux 3.17
community
w3m-image 0.5.3.20220429 - scrumpyjack@st.ilet.to
Alpine Linux 3.17
community
w3m-perl 0.5.3.20220429 - scrumpyjack@st.ilet.to
Alpine Linux 3.18
community
w3m 0.5.3.20230718 - scrumpyjack@st.ilet.to
Alpine Linux 3.18
community
w3m-doc 0.5.3.20230718 - scrumpyjack@st.ilet.to
Alpine Linux 3.18
community
w3m-image 0.5.3.20230718 - scrumpyjack@st.ilet.to
Alpine Linux 3.18
community
w3m-perl 0.5.3.20230718 - scrumpyjack@st.ilet.to
Alpine Linux Edge
community
w3m 0.5.3.20230718 - cielesti@protonmail.com
Alpine Linux Edge
community
w3m-doc 0.5.3.20230718 - cielesti@protonmail.com
Alpine Linux Edge
community
w3m-image 0.5.3.20230718 - cielesti@protonmail.com
Alpine Linux Edge
community
w3m-perl 0.5.3.20230718 - cielesti@protonmail.com
ALT Linux p9 w3m 0.5.3 Potentially vulnerable Networking/WWW darktemplar@altlinux.org
ALT Linux p10 w3m 0.5.3 Potentially vulnerable Networking/WWW vseleznv@altlinux.org
ALT Sisyphus w3m 0.5.3 Potentially vulnerable Networking/WWW vseleznv@altlinux.org
Amazon Linux 1
main
w3m 0.5.2 Potentially vulnerable Applications/Internet -
Apertis v2021
v2021/development
w3m 0.5.3 Potentially vulnerable - tats@debian.org, dai@debian.org
Apertis v2022
v2022/development
w3m 0.5.3+git20210102 Potentially vulnerable - tats@debian.org, dai@debian.org
Apertis v2023
v2023/development
w3m 0.5.3+git20210102 Potentially vulnerable - tats@debian.org, dai@debian.org
Apertis v2024 Development
v2024pre/development
w3m 0.5.3+git20230121 Potentially vulnerable - tats@debian.org, dai@debian.org
Arch
extra
w3m 0.5.3.git20230121_1 Potentially vulnerable - -
Arch Linux 32 i486
extra
w3m 0.5.3.git20230121_1 Potentially vulnerable - -
Arch Linux 32 i686
extra
w3m 0.5.3.git20230121_1 Potentially vulnerable - -
Arch Linux 32 pentium4
extra
w3m 0.5.3.git20230121_1 Potentially vulnerable - -
Arch Linux ARM aarch64
extra
w3m 0.5.3.git20230121_1 Potentially vulnerable - -
ArchPOWER powerpc w3m 0.5.3.git20230121_1 Potentially vulnerable - -
ArchPOWER powerpc64le w3m 0.5.3.git20230121_1 Potentially vulnerable - -
ArchPOWER riscv64 w3m 0.5.3.git20230121_1 Potentially vulnerable - -
Artix
world
w3m 0.5.3.git20230121_1 Potentially vulnerable - -
CentOS 6
os
w3m 0.5.2 Potentially vulnerable Applications/Internet -
CRUX 3.4
opt
w3m 0.5.3 Potentially vulnerable - tek@serverop.de
CRUX 3.5
opt
w3m 0.5.3-37 - tek@serverop.de
CRUX 3.6
opt
w3m 0.5.3-38 - crux@romster.me
Cygwin w3m 0.5.3 Potentially vulnerable Web orphaned@cygwin
Cygwin w3m-debuginfo 0.5.3 Potentially vulnerable Debug orphaned@cygwin
Debian 10
buster/main
w3m 0.5.3 Potentially vulnerable web tats@debian.org, dai@debian.org
Debian 10
buster/updates/main
w3m 0.5.3 Potentially vulnerable web tats@debian.org, dai@debian.org
Debian 11
bullseye/main
w3m 0.5.3+git20210102 Potentially vulnerable web tats@debian.org, dai@debian.org
Debian 12
bookworm/main
w3m 0.5.3+git20230121 Potentially vulnerable web tats@debian.org, dai@debian.org
Debian 13
trixie/main
w3m 0.5.3+git20230121 Potentially vulnerable web tats@debian.org, dai@debian.org
Debian Unstable
sid/main
w3m 0.5.3+git20230121 Potentially vulnerable web tats@debian.org, dai@debian.org
Debian Janitor - Releases w3m 0.5.3+git20230129 Potentially vulnerable - tats@debian.org, dai@debian.org
Deepin
main
w3m 0.5.3 Potentially vulnerable - tats@debian.org, dai@debian.org
Devuan 3.0
beowulf/main
w3m 0.5.3 Potentially vulnerable web tats@debian.org, dai@debian.org
Devuan 4.0
chimaera/main
w3m 0.5.3+git20210102 Potentially vulnerable web tats@debian.org, dai@debian.org
Devuan Unstable
unstable/main
w3m 0.5.3+git20230121 Potentially vulnerable web tats@debian.org, dai@debian.org
EPEL 7 w3m 0.5.3 Potentially vulnerable Unspecified -
EPEL 8 w3m 0.5.3 Potentially vulnerable Unspecified -
EPEL 9 w3m 0.5.3 Potentially vulnerable Unspecified -
Exherbo
net
net-www/w3m 0.5.3 Potentially vulnerable net-www fallback-mnt-exherbo@repology
Fedora 26
release
w3m 0.5.3 Potentially vulnerable Unspecified -
Fedora 27
updates
w3m 0.5.3 Potentially vulnerable Unspecified -
Fedora 27
release
w3m 0.5.3 Potentially vulnerable Unspecified -
Fedora 28
release
w3m 0.5.3 Potentially vulnerable Unspecified -
Fedora 29
release
w3m 0.5.3 Potentially vulnerable Unspecified -
Fedora 30
release
w3m 0.5.3 Potentially vulnerable Unspecified -
Fedora 30
updates
w3m 0.5.3 Potentially vulnerable Unspecified -
Fedora 31
release
w3m 0.5.3 Potentially vulnerable Unspecified -
Fedora 31
updates
w3m 0.5.3 Potentially vulnerable Unspecified -
Fedora 32
release
w3m 0.5.3 Potentially vulnerable Unspecified -
Fedora 32
updates
w3m 0.5.3 Potentially vulnerable Unspecified -
Fedora 33
updates
w3m 0.5.3 Potentially vulnerable Unspecified -
Fedora 33
release
w3m 0.5.3 Potentially vulnerable Unspecified -
Fedora 34
release
w3m 0.5.3 Potentially vulnerable Unspecified -
Fedora 34
updates
w3m 0.5.3 Potentially vulnerable Unspecified -
Fedora 35
release
w3m 0.5.3 Potentially vulnerable Unspecified -
Fedora 35
updates
w3m 0.5.3 Potentially vulnerable Unspecified -
Fedora 36
release
w3m 0.5.3 Potentially vulnerable Unspecified -
Fedora 36
updates
w3m 0.5.3 Potentially vulnerable Unspecified -
Fedora 37
release
w3m 0.5.3 Potentially vulnerable Unspecified -
Fedora 37
updates
w3m 0.5.3 Potentially vulnerable Unspecified -
Fedora 38
release
w3m 0.5.3 Potentially vulnerable Unspecified -
Fedora 39
development
w3m 0.5.3 Potentially vulnerable Unspecified -
Fedora Rawhide
development
w3m 0.5.3 Potentially vulnerable Unspecified -
FreeBSD Ports japanese/w3m 0.5.3.20230129 japanese nobutaka@freebsd.org
FreeBSD Ports www/w3m 0.5.3.20230129 www nobutaka@freebsd.org
Gentoo www-client/w3m 0.5.3_p20230121 Potentially vulnerable www-client nrk@disroot.org, proxy-maint@gentoo.org
Gentoo www-client/w3m 0.5.3_p20220429 Potentially vulnerable www-client nrk@disroot.org, proxy-maint@gentoo.org
Gentoo www-client/w3m 0.5.3_p20220429 Potentially vulnerable www-client nrk@disroot.org, proxy-maint@gentoo.org
Gentoo www-client/w3m 0.5.3_p20220216 Potentially vulnerable www-client nrk@disroot.org, proxy-maint@gentoo.org
Gentoo www-client/w3m 0.5.3_p20210102 Potentially vulnerable www-client nrk@disroot.org, proxy-maint@gentoo.org
GNU Guix w3m 0.5.3+git20230121 Potentially vulnerable - -
GNU Guix w3m 0.5.3+git20230121 Potentially vulnerable - -
GoboLinux W3M 0.5.2 Potentially vulnerable - -
HaikuPorts master www-client/w3m 0.5.3~git20220429 Potentially vulnerable www-client -
Homebrew w3m HEAD - -
Homebrew w3m 0.5.3 Potentially vulnerable - -
HP-UX 11.31
hppa_32
w3m 0.5.3 Potentially vulnerable - -
HP-UX 11.31
ia64_32
w3m 0.5.3 Potentially vulnerable - -
HP-UX 11.31
ia64_64
w3m 0.5.3 Potentially vulnerable - -
Kali Linux Rolling
main
w3m 0.5.3+git20230121 Potentially vulnerable web tats@debian.org, dai@debian.org
KaOS
apps
w3m 0.5.3git20230121 Potentially vulnerable - demm@kaosx.us
LiGurOS stable www-client/w3m 0.5.3_p20220429 Potentially vulnerable www-client dev@liguros.net, cjk@gentoo.org
LiGurOS develop www-client/w3m 0.5.3_p20230121 Potentially vulnerable www-client dev@liguros.net, cjk@gentoo.org
LiGurOS develop www-client/w3m 0.5.3_p20220429 Potentially vulnerable www-client dev@liguros.net, cjk@gentoo.org
MacPorts w3m 0.5.3.20230121 www mohd-akram@github
Mageia 8
core/release
w3m 0.5.3 Potentially vulnerable Networking/WWW -
Mageia 8
core/updates
w3m 0.5.3 Potentially vulnerable Networking/WWW -
Mageia cauldron
core/release
w3m 0.5.3 Potentially vulnerable Networking/WWW -
Manjaro Stable
extra
w3m 0.5.3.git20230121_1 Potentially vulnerable - -
Manjaro Testing
extra
w3m 0.5.3.git20230121_1 Potentially vulnerable - -
Manjaro Unstable
extra
w3m 0.5.3.git20230121_1 Potentially vulnerable - -
MidnightBSD mports www/w3m 0.5.3.20230129 www -
MSYS2 msys2
x86_64
w3m 0.5.3+20220429 net-utils -
nixpkgs stable 21.11 w3m 0.5.3+git20190105 Potentially vulnerable - charles@cstrahan.com
nixpkgs stable 21.11 w3m 0.5.3+git20190105 Potentially vulnerable - charles@cstrahan.com
nixpkgs stable 21.11 w3m 0.5.3+git20190105 Potentially vulnerable - charles@cstrahan.com
nixpkgs stable 21.11 w3m 0.5.3+git20190105 Potentially vulnerable - charles@cstrahan.com
nixpkgs stable 22.05 w3m 0.5.3+git20190105 Potentially vulnerable - charles@cstrahan.com
nixpkgs stable 22.05 w3m 0.5.3+git20190105 Potentially vulnerable - charles@cstrahan.com
nixpkgs stable 22.05 w3m 0.5.3+git20190105 Potentially vulnerable - charles@cstrahan.com
nixpkgs stable 22.05 w3m 0.5.3+git20190105 Potentially vulnerable - charles@cstrahan.com
nixpkgs stable 22.11 w3m 0.5.3+git20220429 Potentially vulnerable - charles@cstrahan.com, anthony@roussel.dev
nixpkgs stable 22.11 w3m 0.5.3+git20220429 Potentially vulnerable - charles@cstrahan.com, anthony@roussel.dev
nixpkgs stable 22.11 w3m 0.5.3+git20220429 Potentially vulnerable - charles@cstrahan.com, anthony@roussel.dev
nixpkgs stable 22.11 w3m 0.5.3+git20220429 Potentially vulnerable - charles@cstrahan.com, anthony@roussel.dev
nixpkgs stable 23.05 w3m 0.5.3+git20230121 Potentially vulnerable - charles@cstrahan.com, anthony@roussel.dev
nixpkgs stable 23.05 w3m 0.5.3+git20230121 Potentially vulnerable - charles@cstrahan.com, anthony@roussel.dev
nixpkgs stable 23.05 w3m 0.5.3+git20230121 Potentially vulnerable - charles@cstrahan.com, anthony@roussel.dev
nixpkgs stable 23.05 w3m 0.5.3+git20230121 Potentially vulnerable - charles@cstrahan.com, anthony@roussel.dev
nixpkgs stable 23.11 w3m 0.5.3+git20230121 Potentially vulnerable - anthony@roussel.dev
nixpkgs stable 23.11 w3m 0.5.3+git20230121 Potentially vulnerable - anthony@roussel.dev
nixpkgs stable 23.11 w3m 0.5.3+git20230121 Potentially vulnerable - anthony@roussel.dev
nixpkgs stable 23.11 w3m 0.5.3+git20230121 Potentially vulnerable - anthony@roussel.dev
nixpkgs unstable w3m 0.5.3+git20230121 Potentially vulnerable - anthony@roussel.dev
nixpkgs unstable w3m 0.5.3+git20230121 Potentially vulnerable - anthony@roussel.dev
nixpkgs unstable w3m 0.5.3+git20230121 Potentially vulnerable - anthony@roussel.dev
nixpkgs unstable w3m 0.5.3+git20230121 Potentially vulnerable - anthony@roussel.dev
OpenBSD Ports www/w3m 0.5.3pl20230121 Potentially vulnerable www ports@openbsd.org
OpenBSD Ports www/w3m 0.5.3pl20230121 Potentially vulnerable www ports@openbsd.org
OpenIndiana packages
hipster
w3m 0.5.3+git20230121 Potentially vulnerable Applications/Internet -
OpenPKG w3m 0.5.3 Potentially vulnerable Web -
openSUSE Leap 42.3
main/oss
w3m 0.5.3.git20161120 Potentially vulnerable Productivity/Networking/Web/Browsers -
openSUSE Leap 42.3
updates/oss
w3m 0.5.3.git20161120 Potentially vulnerable Productivity/Networking/Web/Browsers -
openSUSE Leap 15.0
main/oss
w3m 0.5.3 Potentially vulnerable Productivity/Networking/Web/Browsers -
openSUSE Leap 15.1
main/oss
w3m 0.5.3 Potentially vulnerable Productivity/Networking/Web/Browsers -
openSUSE Leap 15.2
main/oss
w3m 0.5.3 Potentially vulnerable Productivity/Networking/Web/Browsers -
openSUSE Leap 15.3
main/oss
w3m 0.5.3 Potentially vulnerable Productivity/Networking/Web/Browsers -
openSUSE Leap 15.4
main/oss
w3m 0.5.3 Potentially vulnerable Productivity/Networking/Web/Browsers -
openSUSE Leap 15.5
main/oss
w3m 0.5.3 Potentially vulnerable Productivity/Networking/Web/Browsers -
openSUSE Tumbleweed
src-oss
w3m 0.5.3 Potentially vulnerable Productivity/Networking/Web/Browsers -
openSUSE network Tumbleweed w3m 0.5.3 Potentially vulnerable Productivity/Networking/Web/Browsers -
Parabola
extra
w3m 0.5.3.git20230121_1 Potentially vulnerable - -
Pardus 21
main
w3m 0.5.3+git20210102 Potentially vulnerable web tats@debian.org, dai@debian.org
Parrot
parrot/main
w3m 0.5.3+git20210102 Potentially vulnerable web tats@debian.org, dai@debian.org
Parrot
parrot-updates/main
w3m 0.5.3+git20210102 Potentially vulnerable web tats@debian.org, dai@debian.org
PCLinuxOS w3m 0.5.3 Potentially vulnerable Networking/WWW -
pkgsrc current www/w3m 0.5.3.0.20230121 Potentially vulnerable www uebayasi@netbsd.org
PLD Linux w3m 0.5.3 Potentially vulnerable - -
PureOS Amber w3m 0.5.3 Potentially vulnerable web tats@debian.org, dai@debian.org
PureOS landing w3m 0.5.3+git20230121 Potentially vulnerable web tats@debian.org, dai@debian.org
Raspbian Oldstable
main
w3m 0.5.3+git20210102 Potentially vulnerable web tats@debian.org, dai@debian.org
Raspbian Stable
main
w3m 0.5.3+git20230121 Potentially vulnerable web tats@debian.org, dai@debian.org
Raspbian Testing
main
w3m 0.5.3+git20230121 Potentially vulnerable web tats@debian.org, dai@debian.org
Ravenports w3m 0.5.3.git20230121 Potentially vulnerable www fallback-mnt-ravenports@repology
Rosa 2014.1
contrib/release
w3m 0.5.3 Potentially vulnerable - -
Rosa 2014.1
contrib/updates
w3m 0.5.3 Potentially vulnerable - -
Rosa 2016.1
contrib/updates
w3m 0.5.3 Potentially vulnerable - -
Rosa 2016.1
contrib/release
w3m 0.5.3 Potentially vulnerable - -
Rosa 2021.1
contrib/release
w3m 0.5.3 Potentially vulnerable Networking/WWW a.proklov@rosalinux.ru
Rosa Server 6.9
base/release
w3m 0.5.2 Potentially vulnerable Applications/Internet andrew.lukoshko@rosalab.ru
SlackBuilds network/w3m 0.5.3+git20230121 Potentially vulnerable network dave@slackbuilds.org
SliTaz Cooking w3m 0.5.3+git20220429 Potentially vulnerable network mojo@slitaz.org
SliTaz Next w3m 0.5.3 Potentially vulnerable network mojo@slitaz.org
SliTaz Next w3m 0.5.3 Potentially vulnerable network mojo@slitaz.org
Solus w3m 0.5.3.20230121 network.web.browser ems1000.syahrin@gmail.com
Solus w3m-dbginfo 0.5.3.20230121 debug ems1000.syahrin@gmail.com
Spack w3m 0.5.3 Potentially vulnerable - ronin_gw@spack
T2 SDE w3m 0.5.3 Potentially vulnerable extra/office t2@t2-project.org
Termux w3m 0.5.3.20230121 - termux@github
Trisquel 10.0
nabia-updates/main
w3m 0.5.3 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dai@debian.org
Trisquel 10.0
nabia-security/main
w3m 0.5.3 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dai@debian.org
Trisquel 10.0
nabia/main
w3m 0.5.3 Potentially vulnerable text tats@debian.org, dai@debian.org
Trisquel 11.0
aramo/main
w3m 0.5.3+git20210102 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dai@debian.org
Trisquel 11.0
aramo-updates/main
w3m 0.5.3+git20210102 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dai@debian.org
Trisquel 11.0
aramo-security/main
w3m 0.5.3+git20210102 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dai@debian.org
Ubuntu 14.04
trusty/main
w3m 0.5.3 Potentially vulnerable text tats@debian.org, dai@debian.org
Ubuntu 14.04
trusty-updates/main
w3m 0.5.3 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dai@debian.org
Ubuntu 16.04
xenial/universe
w3m 0.5.3 Potentially vulnerable universe/text tats@debian.org, dai@debian.org
Ubuntu 16.04
xenial-updates/universe
w3m 0.5.3 Potentially vulnerable universe/text ubuntu-devel-discuss@lists.ubuntu.com, dai@debian.org
Ubuntu 18.04
bionic-updates/main
w3m 0.5.3 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dai@debian.org
Ubuntu 18.04
bionic/main
w3m 0.5.3 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dai@debian.org
Ubuntu 20.04
focal-updates/main
w3m 0.5.3 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dai@debian.org
Ubuntu 20.04
focal/main
w3m 0.5.3 Potentially vulnerable text tats@debian.org, dai@debian.org
Ubuntu 22.04
jammy/main
w3m 0.5.3+git20210102 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dai@debian.org
Ubuntu 22.04
jammy-updates/main
w3m 0.5.3+git20210102 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dai@debian.org
Ubuntu 23.04
lunar/main
w3m 0.5.3+git20230121 Potentially vulnerable text tats@debian.org, dai@debian.org
Ubuntu 23.10
mantic/main
w3m 0.5.3+git20230121 Potentially vulnerable text tats@debian.org, dai@debian.org
Void Linux x86_64
x86_64
w3m 0.5.3+git20230121 Potentially vulnerable - congdanhqx@gmail.com
Void Linux x86_64
x86_64
w3m-img 0.5.3+git20230121 Potentially vulnerable - congdanhqx@gmail.com
Wikidata w3m 0.5.3 Potentially vulnerable - -
Wikidata w3m v0.5.3+git20230121 Potentially vulnerable - -