Versions Packages Information History CVEs Related Badges Report

Packages for aspell

306 package(s) known

aspell

0.60.8 Potentially vulnerable (0.60.8-r0)

aspell-compat

0.60.8 Potentially vulnerable (0.60.8-r0)

aspell-dbg

0.60.8 Potentially vulnerable (0.60.8-r0)

aspell-dev

0.60.8 Potentially vulnerable (0.60.8-r0)

aspell-doc

0.60.8 Potentially vulnerable (0.60.8-r0)

aspell-lang

0.60.8 Potentially vulnerable (0.60.8-r0)

aspell

0.60.6.1 Potentially vulnerable (0.60.6.1-1)

aspell

0.60.6 Potentially vulnerable (0.60.6-1)
AlmaLinux 8
AppStream

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-22.el8)

aspell

0.60.8 Potentially vulnerable (12:0.60.8-8.el9)

aspell

0.60.6.1 Potentially vulnerable (0.60.6.1-r13)

aspell-compat

0.60.6.1 Potentially vulnerable (0.60.6.1-r13)

aspell-dev

0.60.6.1 Potentially vulnerable (0.60.6.1-r13)

aspell-doc

0.60.6.1 Potentially vulnerable (0.60.6.1-r13)

aspell-lang

0.60.6.1 Potentially vulnerable (0.60.6.1-r13)

aspell-libs

0.60.6.1 Potentially vulnerable (0.60.6.1-r13)

aspell-utils

0.60.6.1 Potentially vulnerable (0.60.6.1-r13)

aspell

0.60.6.1 Potentially vulnerable (0.60.6.1-r14)

aspell-compat

0.60.6.1 Potentially vulnerable (0.60.6.1-r14)

aspell-dev

0.60.6.1 Potentially vulnerable (0.60.6.1-r14)

aspell-doc

0.60.6.1 Potentially vulnerable (0.60.6.1-r14)

aspell-lang

0.60.6.1 Potentially vulnerable (0.60.6.1-r14)

aspell-libs

0.60.6.1 Potentially vulnerable (0.60.6.1-r14)

aspell-utils

0.60.6.1 Potentially vulnerable (0.60.6.1-r14)

aspell

0.60.6.1 Potentially vulnerable (0.60.6.1-r14)

aspell-compat

0.60.6.1 Potentially vulnerable (0.60.6.1-r14)

aspell-dev

0.60.6.1 Potentially vulnerable (0.60.6.1-r14)

aspell-doc

0.60.6.1 Potentially vulnerable (0.60.6.1-r14)

aspell-lang

0.60.6.1 Potentially vulnerable (0.60.6.1-r14)

aspell-libs

0.60.6.1 Potentially vulnerable (0.60.6.1-r14)

aspell-utils

0.60.6.1 Potentially vulnerable (0.60.6.1-r14)

aspell

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-compat

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-dev

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-doc

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-lang

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-libs

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-utils

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-compat

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-dev

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-doc

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-lang

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-libs

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-utils

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-compat

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-dev

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-doc

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-lang

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-libs

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-utils

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-compat

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-dev

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-doc

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-lang

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-libs

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-utils

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-compat

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-dev

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-doc

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-lang

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-libs

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-utils

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-compat

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-dev

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-doc

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-lang

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-libs

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-utils

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell

0.60.8 Potentially vulnerable (0.60.8-r2)

aspell-compat

0.60.8 Potentially vulnerable (0.60.8-r2)

aspell-dev

0.60.8 Potentially vulnerable (0.60.8-r2)

aspell-doc

0.60.8 Potentially vulnerable (0.60.8-r2)

aspell-lang

0.60.8 Potentially vulnerable (0.60.8-r2)

aspell-libs

0.60.8 Potentially vulnerable (0.60.8-r2)

aspell-utils

0.60.8 Potentially vulnerable (0.60.8-r2)

aspell

0.60.8 Potentially vulnerable (0.60.8-r5)

aspell-compat

0.60.8 Potentially vulnerable (0.60.8-r5)

aspell-dev

0.60.8 Potentially vulnerable (0.60.8-r5)

aspell-doc

0.60.8 Potentially vulnerable (0.60.8-r5)

aspell-lang

0.60.8 Potentially vulnerable (0.60.8-r5)

aspell-libs

0.60.8 Potentially vulnerable (0.60.8-r5)

aspell-utils

0.60.8 Potentially vulnerable (0.60.8-r5)

aspell

0.60.8 Potentially vulnerable (0.60.8-r5)

aspell-compat

0.60.8 Potentially vulnerable (0.60.8-r5)

aspell-dev

0.60.8 Potentially vulnerable (0.60.8-r5)

aspell-doc

0.60.8 Potentially vulnerable (0.60.8-r5)

aspell-lang

0.60.8 Potentially vulnerable (0.60.8-r5)

aspell-libs

0.60.8 Potentially vulnerable (0.60.8-r5)

aspell-utils

0.60.8 Potentially vulnerable (0.60.8-r5)

aspell

0.60.8 Potentially vulnerable (0.60.8-alt1)

aspell

0.60.8 Potentially vulnerable (0.60.8-alt2)

aspell

0.60.8 Potentially vulnerable (0.60.8-alt2)

aspell

0.60.6 Potentially vulnerable (12:0.60.6-12.7.amzn1)

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-22.amzn2)

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-9.amzn2.0.1)

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-9.amzn2)
Apertis v2021
v2021/target

aspell

0.60.7~20110707 Potentially vulnerable (0.60.7~20110707-6+deb10u1+apertis1)
Apertis v2022
v2022/target

aspell

0.60.8 Potentially vulnerable (0.60.8-3+apertis0)
Apertis v2023
v2023/target

aspell

0.60.8 Potentially vulnerable (0.60.8-3+apertis0)

aspell

0.60.8 Potentially vulnerable (0.60.8-4+apertis1)
Arch
extra

aspell

0.60.8 Potentially vulnerable (0.60.8-3)

aspell

0.60.8 Potentially vulnerable (0.60.8-3.0)

aspell

0.60.8 Potentially vulnerable (0.60.8-3.0)

aspell

0.60.8 Potentially vulnerable (0.60.8-3.0)

aspell

0.60.8 Potentially vulnerable (0.60.8-3)

aspell-debug

0.60.8 Potentially vulnerable (0.60.8-3)

aspell

0.60.8 Potentially vulnerable (0.60.8-3)

aspell

0.60.8 Potentially vulnerable (0.60.8-3)

aspell

0.60.8 Potentially vulnerable (0.60.8-3)

aspell-git

0.60.8.20190921.r37.gcef82a8 (0.60.8.20190921.r37.gcef82a8-2)

mingw-w64-aspell

0.60.7rc1 Potentially vulnerable (0.60.7rc1-5)
Artix
world

aspell

0.60.8 Potentially vulnerable (0.60.8-3)

aspell

0.60.8 Potentially vulnerable
Carbs Linux
community

aspell

0.60.8 Potentially vulnerable

aspell

0.60.6 Potentially vulnerable (12:0.60.6-12.el6)

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-9.el7)
CentOS 8
AppStream

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-21.el8)
CentOS Stream 8
AppStream

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-21.el8)
CentOS Stream 8
AppStream

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-22.el8)

aspell

0.60.8 Potentially vulnerable (12:0.60.8-8.el9)

aspell

0.60.7-rc1 Potentially vulnerable

aspell

0.60.8 Potentially vulnerable

aspell

0.60.8 Potentially vulnerable

aspell

0.60.8 Potentially vulnerable

aspell

0.60.8 Potentially vulnerable (0.60.8-1)

aspell-debuginfo

0.60.8 Potentially vulnerable (0.60.8-1)

libaspell-devel

0.60.8 Potentially vulnerable (0.60.8-1)

libaspell15

0.60.8 Potentially vulnerable (0.60.8-1)
Debian 10
buster/updates/main

aspell

0.60.7~20110707 Potentially vulnerable (0.60.7~20110707-6+deb10u1)
Debian 10
buster/main

aspell

0.60.7~20110707 Potentially vulnerable (0.60.7~20110707-6+deb10u1)
Deepin
main

aspell

0.60.7~20110707.2 Potentially vulnerable (0.60.7~20110707.2-1+dde)
Devuan 3.0
beowulf/main

aspell

0.60.7~20110707 Potentially vulnerable (0.60.7~20110707-6+deb10u1)
Devuan 4.0
chimaera/main

aspell

0.60.8 Potentially vulnerable (0.60.8-3)
Devuan Unstable
unstable/main

aspell

0.60.8 Potentially vulnerable (0.60.8-6)
Entware
armv7sf-k3.2

aspell

0.60.8 Potentially vulnerable (0.60.8-1)
Entware
mipselsf-k3.4

aspell

0.60.8 Potentially vulnerable (0.60.8-1)
Entware
mipssf-k3.4

aspell

0.60.8 Potentially vulnerable (0.60.8-1)
Entware
x64-k3.2

aspell

0.60.8 Potentially vulnerable (0.60.8-1)
Entware
aarch64-k3.10

aspell

0.60.8 Potentially vulnerable (0.60.8-1)
Entware
armv5sf-k3.2

aspell

0.60.8 Potentially vulnerable (0.60.8-1)
Entware
armv7sf-k2.6

aspell

0.60.8 Potentially vulnerable (0.60.8-1)
Entware
armv7sf-k3.2

libaspell

0.60.8 Potentially vulnerable (0.60.8-1)
Entware
mipselsf-k3.4

libaspell

0.60.8 Potentially vulnerable (0.60.8-1)
Entware
mipssf-k3.4

libaspell

0.60.8 Potentially vulnerable (0.60.8-1)
Entware
x64-k3.2

libaspell

0.60.8 Potentially vulnerable (0.60.8-1)
Entware
aarch64-k3.10

libaspell

0.60.8 Potentially vulnerable (0.60.8-1)
Entware
armv5sf-k3.2

libaspell

0.60.8 Potentially vulnerable (0.60.8-1)
Entware
armv7sf-k2.6

libaspell

0.60.8 Potentially vulnerable (0.60.8-1)
EuroLinux 8
appstream

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-21.el8)
EuroLinux 8
appstream

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-22.el8)
EuroLinux 9
powertools

aspell

0.60.8 Potentially vulnerable (12:0.60.8-8.el9)
Exherbo
arbor

app-spell/aspell

0.60.8 Potentially vulnerable (0.60.8-r1)
Fedora 26
release

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-16.fc26)
Fedora 27
release

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-18.fc27)
Fedora 28
release

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-21.fc28)
Fedora 29
updates

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-25.fc29)
Fedora 29
release

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-24.fc29)
Fedora 30
updates

aspell

0.60.8 Potentially vulnerable (12:0.60.8-1.fc30)
Fedora 30
release

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-25.fc30)
Fedora 31
updates

aspell

0.60.8 Potentially vulnerable (12:0.60.8-1.fc31)
Fedora 31
release

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-26.fc31)
Fedora 32
release

aspell

0.60.8 Potentially vulnerable (12:0.60.8-3.fc32)
Fedora 33
release

aspell

0.60.8 Potentially vulnerable (12:0.60.8-5.fc33)
Fedora 34
release

aspell

0.60.8 Potentially vulnerable (12:0.60.8-6.fc34)
Fedora 34
updates

aspell

0.60.8 Potentially vulnerable (12:0.60.8-7.fc34)
Fedora 35
release

aspell

0.60.8 Potentially vulnerable (12:0.60.8-8.fc35)
Fedora 36
release

aspell

0.60.8 Potentially vulnerable (12:0.60.8-9.fc36)
Fedora 37
release

aspell

0.60.8 Potentially vulnerable (12:0.60.8-10.fc37)
Fedora 38
release

aspell

0.60.8 Potentially vulnerable (12:0.60.8-11.fc38)
Fedora 39
development

aspell

0.60.8 Potentially vulnerable (12:0.60.8-12.fc39)
Fedora Rawhide
development

aspell

0.60.8 Potentially vulnerable (12:0.60.8-12.fc39)

textproc/aspell

0.60.8 Potentially vulnerable (0.60.8_1,1)

textproc/linux-c7-aspell

0.60.6.1 Potentially vulnerable (0.60.6.1_1)

app-text/aspell

0.60.8 Potentially vulnerable (0.60.8-r4)
HP-UX 11.31
hppa_32

aspell

0.60.8 Potentially vulnerable
HP-UX 11.31
ia64_64

aspell

0.60.8 Potentially vulnerable
HP-UX 11.31
hppa_32

aspell

0.60.6.1 Potentially vulnerable
HP-UX 11.31
ia64_32

aspell

0.60.6.1 Potentially vulnerable
HP-UX 11.31
ia64_64

aspell

0.60.6.1 Potentially vulnerable

aspell

0.60.8 Potentially vulnerable (0.60.8-6)
KaOS
main

aspell

0.60.8 Potentially vulnerable (0.60.8-4)

app-text/aspell

0.60.8 Potentially vulnerable (0.60.8-r4)

app-text/aspell

0.60.8 Potentially vulnerable (0.60.8-r4)
Mageia 8
core/updates

aspell

0.60.8 Potentially vulnerable (0.60.8-4.1.mga8)
Mageia 8
core/release

aspell

0.60.8 Potentially vulnerable (0.60.8-4.mga8)
Mageia cauldron
core/release

aspell

0.60.8 Potentially vulnerable (0.60.8-6.mga9)

aspell

0.60.8 Potentially vulnerable (0.60.8-3)

aspell

0.60.8 Potentially vulnerable (0.60.8-3)

aspell

0.60.8 Potentially vulnerable (0.60.8-3)

textproc/aspell

0.60.8 Potentially vulnerable

textproc/linux-c7-aspell

0.60.6.1 Potentially vulnerable (0.60.6.1_1)

mingw-w64-i686-aspell

0.60.8 Potentially vulnerable (0.60.8-2)

mingw-w64-x86_64-aspell

0.60.8 Potentially vulnerable (0.60.8-2)

aspell

0.60.8 Potentially vulnerable (0.60.8-3)

aspell-devel

0.60.8 Potentially vulnerable (0.60.8-3)

aspell

0.60.8 Potentially vulnerable

aspell

0.60.8 Potentially vulnerable

aspell

0.60.8 Potentially vulnerable

aspell

0.60.8 Potentially vulnerable

aspell

0.60.8 Potentially vulnerable

Aspell

0.50.3.3.1 Potentially vulnerable

Aspell

0.50.3.3 Potentially vulnerable

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-25.oe1)

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-28.oe2203)

aspell

0.60.8 Potentially vulnerable
openmamba
devel

aspell

0.60.8 Potentially vulnerable (0.60.8-1mamba)
OpenMandriva 4.0
main/release

aspell

0.60.7-rc1 Potentially vulnerable (0.60.7-0.rc1.2)
OpenMandriva 4.1
main/release

aspell

0.60.8 Potentially vulnerable (0.60.8-1)
OpenMandriva 4.2
main/release

aspell

0.60.8 Potentially vulnerable (0.60.8-1)
OpenMandriva 4.3
main/release

aspell

0.60.8 Potentially vulnerable (0.60.8-2)

aspell

0.60.8 Potentially vulnerable (0.60.8-2)
OpenMandriva Cooker
main/release

aspell

0.60.8 Potentially vulnerable (0.60.8-2)

aspell

0.60.6.1 Potentially vulnerable (0.60.6.1-21.3)
openSUSE Leap 15.0
updates/sle

aspell

0.60.8 Potentially vulnerable (0.60.8-3.3.1)

aspell

0.60.6.1 Potentially vulnerable (0.60.6.1-lp150.1.15)
openSUSE Leap 15.1
updates/sle

aspell

0.60.8 Potentially vulnerable (0.60.8-3.3.1)

aspell

0.60.6.1 Potentially vulnerable (0.60.6.1-lp151.2.4)

aspell

0.60.8 Potentially vulnerable (0.60.8-lp152.1.2)
openSUSE Leap 15.2
updates/oss

aspell

0.60.8 Potentially vulnerable (0.60.8-lp152.2.3.1)
openSUSE Leap 15.2
updates/sle

aspell

0.60.8 Potentially vulnerable (0.60.8-3.3.1)

aspell

0.60.8 Potentially vulnerable (0.60.8-1.9)
openSUSE Leap 15.3
updates/sle

aspell

0.60.8 Potentially vulnerable (0.60.8-3.3.1)

aspell

0.60.8 Potentially vulnerable (0.60.8-3.3.1)
openSUSE Leap 15.4
updates/sle

aspell

0.60.8 Potentially vulnerable (0.60.8-3.3.1)

aspell

0.60.8 Potentially vulnerable (0.60.8-3.3.1)
openSUSE Leap 15.5
updates/sle

aspell

0.60.8 Potentially vulnerable (0.60.8-3.3.1)

aspell

0.60.8 Potentially vulnerable (0.60.8-5.6)
Parabola
extra

aspell

0.60.8 Potentially vulnerable (0.60.8-3)

aspell

0.60.8 Potentially vulnerable (0.60.8-3)
Parrot
parrot-updates/main

aspell

0.60.8 Potentially vulnerable (0.60.8-3)
Parrot
parrot/main

aspell

0.60.8 Potentially vulnerable (0.60.8-3)

aspell

0.60.6.1 Potentially vulnerable (0.60.6.1-13pclos2021)
  • Summary:
    A Free and Open Source interactive spelling checker program
  • Category:
    • Text tools

aspell

0.60.8 Potentially vulnerable

textproc/aspell

0.60.8 Potentially vulnerable (0.60.8nb4)

aspell

0.60.7~20110707 Potentially vulnerable (0.60.7~20110707-6+deb10u1)

aspell

0.60.8 Potentially vulnerable (0.60.8-4)

aspell

0.60.8 Potentially vulnerable (0.60.8-3)

aspell

0.60.8 Potentially vulnerable (0.60.8-4)

aspell

0.60.8 Potentially vulnerable (0.60.8-6)
Rocky Linux 8
AppStream

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-22.el8)

aspell

0.60.8 Potentially vulnerable (12:0.60.8-8.el9.0.1)
Rosa 2021.1
main/release

aspell

0.60.8 Potentially vulnerable (0.60.8-2)
Rosa Server 6.9
base/release

aspell

0.60.6 Potentially vulnerable (12:0.60.6-12.res6)
Rosa Server 7.3
base/release

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-9.res7)
Rosa Server 7.5
base/release

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-9.res7)

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-7.el7)

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-9.el7)
Slackware 14.2
slackware

aspell

0.60.6.1 Potentially vulnerable
Slackware 15.0
slackware

aspell

0.60.8 Potentially vulnerable

aspell

0.60.8 Potentially vulnerable
Slackware64 14.2
slackware64

aspell

0.60.6.1 Potentially vulnerable
Slackware64 15.0
slackware64

aspell

0.60.8 Potentially vulnerable

aspell

0.60.8 Potentially vulnerable

aspell

0.60.6.1 Potentially vulnerable

aspell

0.60.8 Potentially vulnerable

aspell

0.60.8 Potentially vulnerable

aspell-dev

0.60.8 Potentially vulnerable

aspell-lang

0.60.8 Potentially vulnerable

aspell-dev

0.60.6.1 Potentially vulnerable

aspell-dev

0.60.6.1 Potentially vulnerable

aspell

0.60.8 Potentially vulnerable

aspell

0.60.8 Potentially vulnerable
Trisquel 10.0
nabia/main

aspell

0.60.8 Potentially vulnerable (0.60.8-1build1)
Trisquel 10.0
nabia-security/main

aspell

0.60.8 Potentially vulnerable (0.60.8-1ubuntu0.1)
Trisquel 10.0
nabia-updates/main

aspell

0.60.8 Potentially vulnerable (0.60.8-1ubuntu0.1)
Trisquel 11.0
aramo/main

aspell

0.60.8 Potentially vulnerable (0.60.8-4build1)
UBI 8
appstream

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-22.el8)
Ubuntu 14.04
trusty/main

aspell

0.60.7~20110707 Potentially vulnerable (0.60.7~20110707-1ubuntu1)
Ubuntu 16.04
xenial/main

aspell

0.60.7~20110707 Potentially vulnerable (0.60.7~20110707-3build1)
Ubuntu 16.04
xenial-updates/main

aspell

0.60.7~20110707 Potentially vulnerable (0.60.7~20110707-3ubuntu0.1)
Ubuntu 18.04
bionic/main

aspell

0.60.7~20110707 Potentially vulnerable (0.60.7~20110707-4)
Ubuntu 18.04
bionic-updates/main

aspell

0.60.7~20110707 Potentially vulnerable (0.60.7~20110707-4ubuntu0.2)

aspell

0.60.8 Potentially vulnerable (0.60.8_5)

aspell-devel

0.60.8 Potentially vulnerable (0.60.8_5)

libaspell

0.60.8 Potentially vulnerable (0.60.8_5)

GNU Aspell

0.60.8 Potentially vulnerable