Versions Packages Information History CVEs Related Badges Report

Packages for aspell

282 package(s) known

aspell

0.60.8 Potentially vulnerable (0.60.8-r0)

aspell-compat

0.60.8 Potentially vulnerable (0.60.8-r0)

aspell-dbg

0.60.8 Potentially vulnerable (0.60.8-r0)

aspell-dev

0.60.8 Potentially vulnerable (0.60.8-r0)

aspell-doc

0.60.8 Potentially vulnerable (0.60.8-r0)

aspell-lang

0.60.8 Potentially vulnerable (0.60.8-r0)

aspell

0.60.6.1 Potentially vulnerable (0.60.6.1-1)

aspell

0.60.6 Potentially vulnerable (0.60.6-1)

aspell

0.33.6.3 Potentially vulnerable (0.33.6.3-5)
  • Summary:
    A spelling checker.
  • Category:
    • Applications/Text
  • License:
    • LGPL
  • Links(s):
AlmaLinux 8
AppStream

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-21.el8)

aspell

0.60.6.1 Potentially vulnerable (0.60.6.1-r13)

aspell-compat

0.60.6.1 Potentially vulnerable (0.60.6.1-r13)

aspell-dev

0.60.6.1 Potentially vulnerable (0.60.6.1-r13)

aspell-doc

0.60.6.1 Potentially vulnerable (0.60.6.1-r13)

aspell-lang

0.60.6.1 Potentially vulnerable (0.60.6.1-r13)

aspell-libs

0.60.6.1 Potentially vulnerable (0.60.6.1-r13)

aspell-utils

0.60.6.1 Potentially vulnerable (0.60.6.1-r13)

aspell

0.60.6.1 Potentially vulnerable (0.60.6.1-r14)

aspell-compat

0.60.6.1 Potentially vulnerable (0.60.6.1-r14)

aspell-dev

0.60.6.1 Potentially vulnerable (0.60.6.1-r14)

aspell-doc

0.60.6.1 Potentially vulnerable (0.60.6.1-r14)

aspell-lang

0.60.6.1 Potentially vulnerable (0.60.6.1-r14)

aspell-libs

0.60.6.1 Potentially vulnerable (0.60.6.1-r14)

aspell-utils

0.60.6.1 Potentially vulnerable (0.60.6.1-r14)

aspell

0.60.6.1 Potentially vulnerable (0.60.6.1-r14)

aspell-compat

0.60.6.1 Potentially vulnerable (0.60.6.1-r14)

aspell-dev

0.60.6.1 Potentially vulnerable (0.60.6.1-r14)

aspell-doc

0.60.6.1 Potentially vulnerable (0.60.6.1-r14)

aspell-lang

0.60.6.1 Potentially vulnerable (0.60.6.1-r14)

aspell-libs

0.60.6.1 Potentially vulnerable (0.60.6.1-r14)

aspell-utils

0.60.6.1 Potentially vulnerable (0.60.6.1-r14)

aspell

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-compat

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-dev

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-doc

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-lang

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-libs

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-utils

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-compat

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-dev

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-doc

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-lang

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-libs

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-utils

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-compat

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-dev

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-doc

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-lang

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-libs

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-utils

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-compat

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-dev

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-doc

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-lang

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-libs

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-utils

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-compat

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-dev

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-doc

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-lang

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-libs

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-utils

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-compat

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-dev

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-doc

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-lang

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-libs

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell-utils

0.60.8 Potentially vulnerable (0.60.8-r1)

aspell

0.60.8 Potentially vulnerable (0.60.8-alt1)

aspell

0.60.8 Potentially vulnerable (0.60.8-alt1)

aspell

0.60.8 Potentially vulnerable (0.60.8-alt1)

aspell

0.60.6 Potentially vulnerable (12:0.60.6-12.7.amzn1)
  • Summary:
    Spell checker
  • Category:
    • Applications/Text
  • License:
    • LGPLv2 and LGPLv2+ and GPLv2+ and MIT
  • Links(s):

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-9.amzn2)
  • Summary:
    Spell checker
  • Category:
    • Applications/Text
  • License:
    • LGPLv2+ and LGPLv2 and GPLv2+ and BSD
  • Links(s):

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-9.amzn2.0.1)
  • Summary:
    Spell checker
  • Category:
    • Applications/Text
  • License:
    • LGPLv2+ and LGPLv2 and GPLv2+ and BSD
  • Links(s):

aspell

0.60.8 Potentially vulnerable (0.60.8-2)
Apertis v2020
v2020/target

aspell

0.60.7~20110707 Potentially vulnerable (0.60.7~20110707-6+deb10u1+apertis1)
Apertis v2021
v2021/target

aspell

0.60.7~20110707 Potentially vulnerable (0.60.7~20110707-6+deb10u1+apertis1)
Apertis v2022
v2022/target

aspell

0.60.8 Potentially vulnerable (0.60.8-3+apertis0)
Apertis v2023 Development
v2023dev1/target

aspell

0.60.8 Potentially vulnerable (0.60.8-3+apertis0)
Arch
extra

aspell

0.60.8 Potentially vulnerable (0.60.8-2)

aspell

0.60.8 Potentially vulnerable (0.60.8-2.0)

aspell

0.60.8 Potentially vulnerable (0.60.8-2.0)

aspell

0.60.8 Potentially vulnerable (0.60.8-2.0)

aspell

0.60.8 Potentially vulnerable (0.60.8-2)

aspell

0.60.8 Potentially vulnerable (0.60.8-2)

aspell

0.60.8 Potentially vulnerable (0.60.8-2)
  • Summary:
    A spell checker designed to eventually replace Ispell
  • License:
    • LGPL
  • Links(s):

aspell

0.60.8 Potentially vulnerable (0.60.8-2)
  • Summary:
    A spell checker designed to eventually replace Ispell
  • License:
    • LGPL
  • Links(s):

aspell

0.60.8 Potentially vulnerable (0.60.8-2)
  • Summary:
    A spell checker designed to eventually replace Ispell
  • License:
    • LGPL
  • Links(s):

aspell-git

0.60.8.20190921.r37.gcef82a8 (0.60.8.20190921.r37.gcef82a8-1)

mingw-w64-aspell

0.60.7rc1 Potentially vulnerable (0.60.7rc1-5)
Artix
world

aspell

0.60.8 Potentially vulnerable (0.60.8-2.1)
  • Summary:
    A spell checker designed to eventually replace Ispell
  • License:
    • LGPL
  • Links(s):

aspell

0.60.7~20110707 Potentially vulnerable (0.60.7~20110707-3+deb9u1)

aspell

0.60.8 Potentially vulnerable
Carbs Linux
community

aspell

0.60.8 Potentially vulnerable

aspell

0.60.6 Potentially vulnerable (12:0.60.6-12.el6)
  • Summary:
    Spell checker
  • Category:
    • Applications/Text
  • License:
    • LGPLv2 and LGPLv2+ and GPLv2+ and MIT
  • Links(s):

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-9.el7)
CentOS 8
AppStream

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-21.el8)
CentOS Stream 8
AppStream

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-21.el8)
CentOS Stream 8
AppStream

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-22.el8)

aspell

0.60.8 Potentially vulnerable (12:0.60.8-8.el9)

aspell

0.60.7-rc1 Potentially vulnerable

aspell

0.60.8 Potentially vulnerable

aspell

0.60.8 Potentially vulnerable

aspell

0.60.8 Potentially vulnerable (0.60.8-1)

aspell-debuginfo

0.60.8 Potentially vulnerable (0.60.8-1)

libaspell-devel

0.60.8 Potentially vulnerable (0.60.8-1)

libaspell15

0.60.8 Potentially vulnerable (0.60.8-1)
Debian 8
jessie/main

aspell

0.60.7~20110707 Potentially vulnerable (0.60.7~20110707-1.3)
Debian 9
stretch/main

aspell

0.60.7~20110707 Potentially vulnerable (0.60.7~20110707-3)
Debian 10
buster/main

aspell

0.60.7~20110707 Potentially vulnerable (0.60.7~20110707-6+deb10u1)
Deepin
main

aspell

0.60.7~20110707.2 Potentially vulnerable (0.60.7~20110707.2-1+dde)
Devuan 1.0
jessie/main

aspell

0.60.7~20110707 Potentially vulnerable (0.60.7~20110707-1.3)
Devuan 2.0
ascii/main

aspell

0.60.7~20110707 Potentially vulnerable (0.60.7~20110707-3)
Devuan 3.0
beowulf/main

aspell

0.60.7~20110707 Potentially vulnerable (0.60.7~20110707-6+deb10u1)
Devuan 4.0
chimaera/main

aspell

0.60.8 Potentially vulnerable (0.60.8-3)
Devuan Unstable
unstable/main

aspell

0.60.8 Potentially vulnerable (0.60.8-4)

textproc/aspell

0.60.8 Potentially vulnerable (0.60.8_1,1)
Entware
aarch64-k3.10

aspell

0.60.8 Potentially vulnerable (0.60.8-1)
Entware
armv5sf-k3.2

aspell

0.60.8 Potentially vulnerable (0.60.8-1)
Entware
armv7sf-k2.6

aspell

0.60.8 Potentially vulnerable (0.60.8-1)
Entware
armv7sf-k3.2

aspell

0.60.8 Potentially vulnerable (0.60.8-1)
Entware
mipselsf-k3.4

aspell

0.60.8 Potentially vulnerable (0.60.8-1)
Entware
mipssf-k3.4

aspell

0.60.8 Potentially vulnerable (0.60.8-1)
Entware
x64-k3.2

aspell

0.60.8 Potentially vulnerable (0.60.8-1)
Entware
aarch64-k3.10

libaspell

0.60.8 Potentially vulnerable (0.60.8-1)
Entware
armv5sf-k3.2

libaspell

0.60.8 Potentially vulnerable (0.60.8-1)
Entware
armv7sf-k2.6

libaspell

0.60.8 Potentially vulnerable (0.60.8-1)
Entware
armv7sf-k3.2

libaspell

0.60.8 Potentially vulnerable (0.60.8-1)
Entware
mipselsf-k3.4

libaspell

0.60.8 Potentially vulnerable (0.60.8-1)
Entware
mipssf-k3.4

libaspell

0.60.8 Potentially vulnerable (0.60.8-1)
Entware
x64-k3.2

libaspell

0.60.8 Potentially vulnerable (0.60.8-1)
EuroLinux 8
appstream

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-21.el8)
  • Summary:
    Spell checker
  • Category:
    • Applications/Text
  • License:
    • LGPLv2+ and LGPLv2 and GPLv2+ and BSD
  • Links(s):
Exherbo
arbor

app-spell/aspell

0.60.8 Potentially vulnerable (0.60.8-r1)
Fedora 26
release

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-16.fc26)
Fedora 27
release

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-18.fc27)
Fedora 28
release

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-21.fc28)
Fedora 29
release

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-24.fc29)
Fedora 29
updates

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-25.fc29)
Fedora 30
updates

aspell

0.60.8 Potentially vulnerable (12:0.60.8-1.fc30)
Fedora 30
release

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-25.fc30)
Fedora 31
updates

aspell

0.60.8 Potentially vulnerable (12:0.60.8-1.fc31)
Fedora 31
release

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-26.fc31)
Fedora 32
release

aspell

0.60.8 Potentially vulnerable (12:0.60.8-3.fc32)
Fedora 33
release

aspell

0.60.8 Potentially vulnerable (12:0.60.8-5.fc33)
Fedora 34
release

aspell

0.60.8 Potentially vulnerable (12:0.60.8-6.fc34)
Fedora 34
updates

aspell

0.60.8 Potentially vulnerable (12:0.60.8-7.fc34)
Fedora 35
release

aspell

0.60.8 Potentially vulnerable (12:0.60.8-8.fc35)
Fedora 36
development

aspell

0.60.8 Potentially vulnerable (12:0.60.8-9.fc36)
Fedora Rawhide
development

aspell

0.60.8 Potentially vulnerable (12:0.60.8-9.fc36)

textproc/aspell

0.60.8 Potentially vulnerable (0.60.8_1,1)

textproc/linux-c7-aspell

0.60.6.1 Potentially vulnerable (0.60.6.1_1)
Funtoo 1.4
text-kit

app-text/aspell

0.60.8 Potentially vulnerable

app-text/aspell

0.60.8 Potentially vulnerable (0.60.8-r4)

Aspell

0.60.7_rc2 Potentially vulnerable

aspell

0.60.8 Potentially vulnerable
HP-UX 11.31
ia64_64

aspell

0.60.8 Potentially vulnerable
HP-UX 11.31
hppa_32

aspell

0.60.8 Potentially vulnerable
HP-UX 11.31
ia64_64

aspell

0.60.6.1 Potentially vulnerable
HP-UX 11.31
hppa_32

aspell

0.60.6.1 Potentially vulnerable
HP-UX 11.31
ia64_32

aspell

0.60.6.1 Potentially vulnerable

aspell

0.60.8 Potentially vulnerable (0.60.8-4)
KaOS
main

aspell

0.60.8 Potentially vulnerable (0.60.8-3)

app-text/aspell

0.60.8 Potentially vulnerable (0.60.8-r4)

app-text/aspell

0.60.8 Potentially vulnerable (0.60.8-r4)

aspell

0.60.8 Potentially vulnerable
Mageia 7
core/updates

aspell

0.60.8 Potentially vulnerable (0.60.8-1.mga7)
Mageia 7
core/release

aspell

0.60.6.1 Potentially vulnerable (0.60.6.1-12.mga7)
Mageia 8
core/release

aspell

0.60.8 Potentially vulnerable (0.60.8-4.mga8)
  • Summary:
    A Free and Open Source interactive spelling checker program
  • Category:
    • Text tools
  • License:
    • LGPL
  • Links(s):
Mageia 8
core/updates

aspell

0.60.8 Potentially vulnerable (0.60.8-4.1.mga8)
  • Summary:
    A Free and Open Source interactive spelling checker program
  • Category:
    • Text tools
  • License:
    • LGPL
  • Links(s):
Mageia Cauldron
core/release

aspell

0.60.8 Potentially vulnerable (0.60.8-6.mga9)

aspell

0.60.8 Potentially vulnerable (0.60.8-2)
  • Summary:
    A spell checker designed to eventually replace Ispell
  • License:
    • LGPL
  • Links(s):

aspell

0.60.8 Potentially vulnerable (0.60.8-2)
  • Summary:
    A spell checker designed to eventually replace Ispell
  • License:
    • LGPL
  • Links(s):

aspell

0.60.8 Potentially vulnerable (0.60.8-2)
  • Summary:
    A spell checker designed to eventually replace Ispell
  • License:
    • LGPL
  • Links(s):

textproc/aspell

0.60.8 Potentially vulnerable

textproc/linux-c7-aspell

0.60.6.1 Potentially vulnerable (0.60.6.1_1)

mingw-w64-i686-aspell

0.60.8 Potentially vulnerable (0.60.8-2)

mingw-w64-x86_64-aspell

0.60.8 Potentially vulnerable (0.60.8-2)

aspell

0.60.8 Potentially vulnerable (0.60.8-1)

aspell

0.60.8 Potentially vulnerable (0.60.8-1)

aspell-devel

0.60.8 Potentially vulnerable (0.60.8-1)

aspell-devel

0.60.8 Potentially vulnerable (0.60.8-1)

aspell

0.60.8 Potentially vulnerable

aspell

0.60.8 Potentially vulnerable

aspell

0.60.8 Potentially vulnerable

Aspell

0.50.3.3.1 Potentially vulnerable

Aspell

0.50.3.3 Potentially vulnerable

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-25.oe1)

aspell

0.60.8 Potentially vulnerable
openmamba
devel

aspell

0.60.8 Potentially vulnerable (0.60.8-1mamba)
OpenMandriva 4.0
main/release

aspell

0.60.7-rc1 Potentially vulnerable (0.60.7-0.rc1.2)
OpenMandriva 4.1
main/release

aspell

0.60.8 Potentially vulnerable (0.60.8-1)
OpenMandriva 4.2
main/release

aspell

0.60.8 Potentially vulnerable (0.60.8-1)

aspell

0.60.8 Potentially vulnerable (0.60.8-2)
OpenMandriva Cooker
main/release

aspell

0.60.8 Potentially vulnerable (0.60.8-2)

aspell

0.60.8 Potentially vulnerable

aspell

0.60.6.1 Potentially vulnerable (0.60.6.1-21.3)

aspell

0.60.6.1 Potentially vulnerable (0.60.6.1-lp150.1.15)

aspell

0.60.6.1 Potentially vulnerable (0.60.6.1-lp151.2.4)

aspell

0.60.8 Potentially vulnerable (0.60.8-lp152.1.2)
openSUSE Leap 15.2
updates/oss

aspell

0.60.8 Potentially vulnerable (0.60.8-lp152.2.3.1)

aspell

0.60.8 Potentially vulnerable (0.60.8-1.9)

aspell

0.60.8 Potentially vulnerable (0.60.8-3.3.1)

aspell

0.60.8 Potentially vulnerable (0.60.8-4.6)
Parabola
extra

aspell

0.60.8 Potentially vulnerable (0.60.8-2)

aspell

0.60.7~20110707 Potentially vulnerable (0.60.7~20110707-3)

aspell

0.60.7~20110707 Potentially vulnerable (0.60.7~20110707-6+deb10u1)
Pardus 19
updates/main

aspell

0.60.7~20110707 Potentially vulnerable (0.60.7~20110707-6+deb10u1)

aspell

0.60.8 Potentially vulnerable (0.60.8-3)
Parrot
parrot-updates/main

aspell

0.60.8 Potentially vulnerable (0.60.8-3)
Parrot
parrot/main

aspell

0.60.8 Potentially vulnerable (0.60.8-3)

aspell

0.60.6.1 Potentially vulnerable (0.60.6.1-13pclos2021)
  • Summary:
    A Free and Open Source interactive spelling checker program
  • Category:
    • Text tools

aspell

0.60.8 Potentially vulnerable

textproc/aspell

0.60.8 Potentially vulnerable (0.60.8nb3)

aspell

0.60.7~20110707 Potentially vulnerable (0.60.7~20110707-6+deb10u1)

aspell

0.60.8 Potentially vulnerable (0.60.8-3)

aspell

0.60.7~20110707 Potentially vulnerable (0.60.7~20110707-6+deb10u1)

aspell

0.60.8 Potentially vulnerable (0.60.8-3)

aspell

0.60.8 Potentially vulnerable (0.60.8-4)
Rocky Linux 8
AppStream

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-22.el8)
Rosa 2014.1
main/release

aspell

0.60.6.1 Potentially vulnerable (0.60.6.1-4)
Rosa 2016.1
main/release

aspell

0.60.6.1 Potentially vulnerable (0.60.6.1-8)
Rosa 2016.1
main/updates

aspell

0.60.6.1 Potentially vulnerable (0.60.6.1-9)
Rosa 2019.1
main/release

aspell

0.60.8 Potentially vulnerable (0.60.8-2)
Rosa Server 6.9
base/release

aspell

0.60.6 Potentially vulnerable (12:0.60.6-12.res6)
Rosa Server 7.3
base/release

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-9.res7)
Rosa Server 7.5
base/release

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-9.res7)

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-7.el7)
  • Summary:
    Spell checker
  • Category:
    • Applications/Text
  • License:
    • LGPLv2+ and LGPLv2 and GPLv2+ and BSD
  • Links(s):

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-9.el7)
  • Summary:
    Spell checker
  • Category:
    • Applications/Text
  • License:
    • LGPLv2+ and LGPLv2 and GPLv2+ and BSD
  • Links(s):
Slackware 14.2
slackware

aspell

0.60.6.1 Potentially vulnerable
Slackware 15.0
slackware

aspell

0.60.8 Potentially vulnerable

aspell

0.60.8 Potentially vulnerable
Slackware64 14.2
slackware64

aspell

0.60.6.1 Potentially vulnerable
Slackware64 15.0
slackware64

aspell

0.60.8 Potentially vulnerable

aspell

0.60.8 Potentially vulnerable

aspell

0.60.6.1 Potentially vulnerable

aspell

0.60.8 Potentially vulnerable

aspell

0.60.8 Potentially vulnerable

aspell-dev

0.60.8 Potentially vulnerable

aspell-lang

0.60.8 Potentially vulnerable

aspell

0.60.6.1 Potentially vulnerable

aspell-dev

0.60.6.1 Potentially vulnerable

aspell

0.60.8 Potentially vulnerable

aspell

0.60.8 Potentially vulnerable
Trisquel 6.0
toutatis/main

aspell

0.60.7~20110707 Potentially vulnerable (0.60.7~20110707-1)
Trisquel 7.0
belenos/main

aspell

0.60.7~20110707 Potentially vulnerable (0.60.7~20110707-1ubuntu1)
Trisquel 8.0
flidas-updates/main

aspell

0.60.7~20110707 Potentially vulnerable (0.60.7~20110707-3ubuntu0.1)
Trisquel 8.0
flidas/main

aspell

0.60.7~20110707 Potentially vulnerable (0.60.7~20110707-3build1)
Trisquel 9.0
etiona/main

aspell

0.60.7~20110707 Potentially vulnerable (0.60.7~20110707-4)
Trisquel 9.0
etiona-updates/main

aspell

0.60.7~20110707 Potentially vulnerable (0.60.7~20110707-4ubuntu0.2)
Trisquel 10.0
nabia/main

aspell

0.60.8 Potentially vulnerable (0.60.8-1build1)
Trisquel 10.0
nabia-updates/main

aspell

0.60.8 Potentially vulnerable (0.60.8-1ubuntu0.1)
UBI 8
appstream

aspell

0.60.6.1 Potentially vulnerable (12:0.60.6.1-22.el8)
  • Summary:
    Spell checker
  • Category:
    • Applications/Text
  • License:
    • LGPLv2+ and LGPLv2 and GPLv2+ and BSD
  • Links(s):
Ubuntu 14.04
trusty/main

aspell

0.60.7~20110707 Potentially vulnerable (0.60.7~20110707-1ubuntu1)
Ubuntu 16.04
xenial-updates/main

aspell

0.60.7~20110707 Potentially vulnerable (0.60.7~20110707-3ubuntu0.1)
Ubuntu 16.04
xenial/main

aspell

0.60.7~20110707 Potentially vulnerable (0.60.7~20110707-3build1)
Ubuntu 18.04
bionic-updates/main

aspell

0.60.7~20110707 Potentially vulnerable (0.60.7~20110707-4ubuntu0.2)
Ubuntu 18.04
bionic/main

aspell

0.60.7~20110707 Potentially vulnerable (0.60.7~20110707-4)
Ubuntu 20.04
focal/main

aspell

0.60.8 Potentially vulnerable (0.60.8-1build1)
Ubuntu 20.04
focal-updates/main

aspell

0.60.8 Potentially vulnerable (0.60.8-1ubuntu0.1)
Ubuntu 21.04
hirsute-updates/main

aspell

0.60.8 Potentially vulnerable (0.60.8-2ubuntu0.1)
Ubuntu 21.04
hirsute/main

aspell

0.60.8 Potentially vulnerable (0.60.8-2)
Ubuntu 22.04
jammy/main

aspell

0.60.8 Potentially vulnerable (0.60.8-4build1)

aspell

0.60.8 Potentially vulnerable (0.60.8_5)

aspell-devel

0.60.8 Potentially vulnerable (0.60.8_5)

libaspell

0.60.8 Potentially vulnerable (0.60.8_5)

GNU Aspell

0.60.8 Potentially vulnerable