Hironori Sakamoto found some vulnerabilities in w3m support scripts, such as multipart.cgi, w3mman2html.cgi and w3mhelp.cgi. Attacker could run arbitrary commands on user's machine with user's privilege by using malicious html pages.
4 lines
200 B
Plaintext
4 lines
200 B
Plaintext
MD5 (w3m-0.2.3.2.tar.gz) = 8c97d7a9968bd3f54373b4cbd2c391e0
|
|
RMD160 (w3m-0.2.3.2.tar.gz) = 0347b165d54c24781be5bd362086fd247f49b1cf
|
|
SHA1 (w3m-0.2.3.2.tar.gz) = 2f8ecf5cc4a0e3eb357340bf5e024cfea5257684
|