Red Hat W3m Vulnerabilities