It was discovered that w3m incorrectly handled certain inputs. An attacker could possibly use this to cause a denial of service. (CVE-2018-6196, CVE-2018-6197)
It was discovered that w3m incorrectly handled temporary files. An attacker could possibly use this to overwrite arbitrary files. (CVE-2018-6198)
{ "availability": "No subscription required", "binaries": [ { "binary_version": "0.5.3-15ubuntu0.2", "binary_name": "w3m" }, { "binary_version": "0.5.3-15ubuntu0.2", "binary_name": "w3m-dbgsym" }, { "binary_version": "0.5.3-15ubuntu0.2", "binary_name": "w3m-img" }, { "binary_version": "0.5.3-15ubuntu0.2", "binary_name": "w3m-img-dbgsym" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "0.5.3-26ubuntu0.2", "binary_name": "w3m" }, { "binary_version": "0.5.3-26ubuntu0.2", "binary_name": "w3m-dbgsym" }, { "binary_version": "0.5.3-26ubuntu0.2", "binary_name": "w3m-img" }, { "binary_version": "0.5.3-26ubuntu0.2", "binary_name": "w3m-img-dbgsym" } ] }