Versions Packages Information History CVEs Related Badges Report

Versions for aspell

314 package(s) known

Repository Package name Version Category Maintainer(s)
Adélie Linux current
user
aspell 0.60.8 Potentially vulnerable - sheila@vulpine.house
Adélie Linux current
user
aspell-compat 0.60.8 Potentially vulnerable - sheila@vulpine.house
Adélie Linux current
user
aspell-dbg 0.60.8 Potentially vulnerable - sheila@vulpine.house
Adélie Linux current
user
aspell-dev 0.60.8 Potentially vulnerable - sheila@vulpine.house
Adélie Linux current
user
aspell-doc 0.60.8 Potentially vulnerable - sheila@vulpine.house
Adélie Linux current
user
aspell-lang 0.60.8 Potentially vulnerable - sheila@vulpine.house
AIX Open Source Packages aspell 0.60.6.1 Potentially vulnerable - -
AIX Open Source Packages aspell 0.60.6 Potentially vulnerable - -
AlmaLinux 8
AppStream
aspell 0.60.6.1 Potentially vulnerable Applications/Text packager@almalinux.org
AlmaLinux 9
CRB
aspell 0.60.8 Potentially vulnerable Unspecified packager@almalinux.org
Alpine Linux 3.8
main
aspell-libs 0.60.6.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
aspell-lang 0.60.6.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
aspell 0.60.6.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
aspell-doc 0.60.6.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
aspell-utils 0.60.6.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
aspell-dev 0.60.6.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
aspell-compat 0.60.6.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
aspell 0.60.6.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
aspell-compat 0.60.6.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
aspell-lang 0.60.6.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
aspell-libs 0.60.6.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
aspell-dev 0.60.6.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
aspell-doc 0.60.6.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
aspell-utils 0.60.6.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
aspell-utils 0.60.6.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
aspell-doc 0.60.6.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
aspell-compat 0.60.6.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
aspell-libs 0.60.6.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
aspell 0.60.6.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
aspell-dev 0.60.6.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
aspell-lang 0.60.6.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
aspell 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
aspell-utils 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
aspell-libs 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
aspell-dev 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
aspell-compat 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
aspell-doc 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
aspell-lang 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
aspell-compat 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
aspell-doc 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
aspell-libs 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
aspell 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
aspell-utils 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
aspell-lang 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
aspell-dev 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
aspell-compat 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
aspell-utils 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
aspell 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
aspell-lang 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
aspell-libs 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
aspell-doc 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
aspell-dev 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
aspell-utils 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
aspell-doc 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
aspell-libs 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
aspell-dev 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
aspell 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
aspell-lang 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
aspell-compat 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
aspell-doc 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
aspell-lang 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
aspell-compat 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
aspell-libs 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
aspell-dev 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
aspell 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
aspell-utils 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
aspell-doc 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
aspell-utils 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
aspell-libs 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
aspell-compat 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
aspell-dev 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
aspell 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
aspell-lang 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
main
aspell-dev 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
main
aspell-libs 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
main
aspell-doc 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
main
aspell-compat 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
main
aspell 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
main
aspell-utils 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
main
aspell-lang 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.18
main
aspell 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.18
main
aspell-compat 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.18
main
aspell-dev 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.18
main
aspell-doc 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.18
main
aspell-lang 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.18
main
aspell-libs 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.18
main
aspell-utils 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.19
main
aspell 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.19
main
aspell-compat 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.19
main
aspell-dev 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.19
main
aspell-doc 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.19
main
aspell-lang 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.19
main
aspell-libs 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.19
main
aspell-utils 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
aspell 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
aspell-compat 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
aspell-dev 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
aspell-doc 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
aspell-lang 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
aspell-libs 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
aspell-utils 0.60.8 Potentially vulnerable - ncopa@alpinelinux.org
ALT Linux p9 aspell 0.60.8 Potentially vulnerable Text tools taf@altlinux.org
ALT Linux p10 aspell 0.60.8 Potentially vulnerable Text tools admsasha@altlinux.org
ALT Sisyphus aspell 0.60.8 Potentially vulnerable Text tools admsasha@altlinux.org
Amazon Linux 1
main
aspell 0.60.6 Potentially vulnerable Applications/Text -
Amazon Linux 2 aspell 0.60.6.1 Potentially vulnerable Applications/Text -
Amazon Linux 2 aspell 0.60.6.1 Potentially vulnerable Applications/Text -
Amazon Linux 2 aspell 0.60.6.1 Potentially vulnerable Applications/Text -
Apertis v2021
v2021/target
aspell 0.60.7~20110707 Potentially vulnerable - agmartin@debian.org
Apertis v2022
v2022/target
aspell 0.60.8 Potentially vulnerable - agmartin@debian.org
Apertis v2023
v2023/target
aspell 0.60.8 Potentially vulnerable - agmartin@debian.org
Apertis v2024 Development
v2024pre/target
aspell 0.60.8 Potentially vulnerable - agmartin@debian.org
Arch
extra
aspell 0.60.8 Potentially vulnerable - -
Arch Linux 32 i486
extra
aspell 0.60.8 Potentially vulnerable - -
Arch Linux 32 i686
extra
aspell 0.60.8 Potentially vulnerable - -
Arch Linux 32 pentium4
extra
aspell 0.60.8 Potentially vulnerable - -
Arch Linux ARM aarch64
extra
aspell 0.60.8 Potentially vulnerable - -
Arch Linux ARM aarch64
extra
aspell-debug 0.60.8 Potentially vulnerable - -
ArchPOWER powerpc aspell 0.60.8 Potentially vulnerable - -
ArchPOWER powerpc64le aspell 0.60.8 Potentially vulnerable - -
ArchPOWER riscv64 aspell 0.60.8 Potentially vulnerable - -
AUR aspell-git 0.60.8.20190921.r37.gcef82a8 - chocobo1@aur
AUR mingw-w64-aspell 0.60.7rc1 Potentially vulnerable - maxrd2@aur
Artix
world
aspell 0.60.8 Potentially vulnerable - -
Ataraxia GNU/Linux aspell 0.60.8 Potentially vulnerable office nagakamira@gmail.com
Carbs Linux
community
aspell 0.60.8 Potentially vulnerable - cem@carbslinux.org
CentOS 6
os
aspell 0.60.6 Potentially vulnerable Applications/Text -
CentOS 7
os
aspell 0.60.6.1 Potentially vulnerable Applications/Text -
CentOS 8
AppStream
aspell 0.60.6.1 Potentially vulnerable Applications/Text bugs@centos.org
CentOS Stream 8
AppStream
aspell 0.60.6.1 Potentially vulnerable Applications/Text bugs@centos.org
CentOS Stream 8
AppStream
aspell 0.60.6.1 Potentially vulnerable Applications/Text bugs@centos.org
CentOS Stream 9
CRB
aspell 0.60.8 Potentially vulnerable Unspecified builder@centos.org
CRUX 3.4
opt
aspell 0.60.7-rc1 Potentially vulnerable - jue@crux.nu
CRUX 3.5
opt
aspell 0.60.8 Potentially vulnerable - jue@crux.nu
CRUX 3.6
opt
aspell 0.60.8 Potentially vulnerable - jue@crux.nu
CRUX 3.7
opt
aspell 0.60.8 Potentially vulnerable - jue@crux.nu
Cygwin aspell 0.60.8 Potentially vulnerable Text marco.atzeri@cygwin
Cygwin aspell-debuginfo 0.60.8 Potentially vulnerable Debug marco.atzeri@cygwin
Cygwin libaspell-devel 0.60.8 Potentially vulnerable Devel marco.atzeri@cygwin
Cygwin libaspell15 0.60.8 Potentially vulnerable Libs marco.atzeri@cygwin
Debian 10
buster/updates/main
aspell 0.60.7~20110707 Potentially vulnerable text agmartin@debian.org
Debian 10
buster/main
aspell 0.60.7~20110707 Potentially vulnerable text agmartin@debian.org
Debian 11
bullseye/main
aspell 0.60.8 Potentially vulnerable text agmartin@debian.org
Debian 12
bookworm/main
aspell 0.60.8 Potentially vulnerable text agmartin@debian.org
Debian 13
trixie/main
aspell 0.60.8 Potentially vulnerable text agmartin@debian.org
Debian Unstable
sid/main
aspell 0.60.8 Potentially vulnerable text agmartin@debian.org
Deepin
main
aspell 0.60.7~20110707.2 Potentially vulnerable - agmartin@debian.org
Devuan 3.0
beowulf/main
aspell 0.60.7~20110707 Potentially vulnerable text agmartin@debian.org
Devuan 4.0
chimaera/main
aspell 0.60.8 Potentially vulnerable text agmartin@debian.org
Devuan Unstable
unstable/main
aspell 0.60.8 Potentially vulnerable text agmartin@debian.org
Entware
mipselsf-k3.4
aspell 0.60.8 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
libaspell 0.60.8 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
mipssf-k3.4
aspell 0.60.8 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
libaspell 0.60.8 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
x64-k3.2
aspell 0.60.8 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
libaspell 0.60.8 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
aarch64-k3.10
aspell 0.60.8 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
libaspell 0.60.8 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
armv5sf-k3.2
aspell 0.60.8 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
libaspell 0.60.8 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
armv7sf-k2.6
aspell 0.60.8 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
libaspell 0.60.8 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
armv7sf-k3.2
aspell 0.60.8 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
libaspell 0.60.8 Potentially vulnerable libs fallback-mnt-entware@repology
EuroLinux 8
appstream
aspell 0.60.6.1 Potentially vulnerable Applications/Text -
EuroLinux 8
appstream
aspell 0.60.6.1 Potentially vulnerable Applications/Text -
EuroLinux 9
powertools
aspell 0.60.8 Potentially vulnerable Unspecified -
Exherbo
arbor
app-spell/aspell 0.60.8 Potentially vulnerable app-spell fallback-mnt-exherbo@repology
Fedora 26
release
aspell 0.60.6.1 Potentially vulnerable Applications/Text -
Fedora 27
release
aspell 0.60.6.1 Potentially vulnerable Applications/Text -
Fedora 28
release
aspell 0.60.6.1 Potentially vulnerable Applications/Text -
Fedora 29
release
aspell 0.60.6.1 Potentially vulnerable Applications/Text -
Fedora 29
updates
aspell 0.60.6.1 Potentially vulnerable Applications/Text -
Fedora 30
updates
aspell 0.60.8 Potentially vulnerable Unspecified -
Fedora 30
release
aspell 0.60.6.1 Potentially vulnerable Unspecified -
Fedora 31
updates
aspell 0.60.8 Potentially vulnerable Unspecified -
Fedora 31
release
aspell 0.60.6.1 Potentially vulnerable Unspecified -
Fedora 32
release
aspell 0.60.8 Potentially vulnerable Unspecified -
Fedora 33
release
aspell 0.60.8 Potentially vulnerable Unspecified -
Fedora 34
release
aspell 0.60.8 Potentially vulnerable Unspecified -
Fedora 34
updates
aspell 0.60.8 Potentially vulnerable Unspecified -
Fedora 35
release
aspell 0.60.8 Potentially vulnerable Unspecified -
Fedora 36
release
aspell 0.60.8 Potentially vulnerable Unspecified -
Fedora 37
release
aspell 0.60.8 Potentially vulnerable Unspecified -
Fedora 38
release
aspell 0.60.8 Potentially vulnerable Unspecified -
Fedora 39
development
aspell 0.60.8 Potentially vulnerable Unspecified -
Fedora Rawhide
development
aspell 0.60.8 Potentially vulnerable Unspecified -
FreeBSD Ports textproc/aspell 0.60.8 Potentially vulnerable textproc office@freebsd.org
FreeBSD Ports textproc/linux-c7-aspell 0.60.6.1 Potentially vulnerable textproc emulation@freebsd.org
Gentoo app-text/aspell 0.60.8 Potentially vulnerable app-text conikost@gentoo.org
GNU Guix aspell 0.60.8 Potentially vulnerable - -
GoboLinux Aspell 0.60.7_rc2 Potentially vulnerable - -
HaikuPorts master app-text/aspell 0.60.8 Potentially vulnerable app-text -
Homebrew aspell 0.60.8 Potentially vulnerable - -
HP-UX 11.31
hppa_32
aspell 0.60.8 Potentially vulnerable - -
HP-UX 11.31
ia64_64
aspell 0.60.8 Potentially vulnerable - -
HP-UX 11.31
hppa_32
aspell 0.60.6.1 Potentially vulnerable - -
HP-UX 11.31
ia64_32
aspell 0.60.6.1 Potentially vulnerable - -
HP-UX 11.31
ia64_64
aspell 0.60.6.1 Potentially vulnerable - -
Kali Linux Rolling
main
aspell 0.60.8 Potentially vulnerable text agmartin@debian.org
KaOS
main
aspell 0.60.8 Potentially vulnerable - demm@kaosx.us
LiGurOS stable app-text/aspell 0.60.8 Potentially vulnerable app-text conikost@gentoo.org
LiGurOS develop app-text/aspell 0.60.8 Potentially vulnerable app-text conikost@gentoo.org
MacPorts aspell 0.60.8 Potentially vulnerable textproc jochen@macports, jokuha@github
Mageia 8
core/release
aspell 0.60.8 Potentially vulnerable Text tools -
Mageia 8
core/updates
aspell 0.60.8 Potentially vulnerable Text tools -
Mageia cauldron
core/release
aspell 0.60.8 Potentially vulnerable Text tools -
Manjaro Stable
extra
aspell 0.60.8 Potentially vulnerable - -
Manjaro Testing
extra
aspell 0.60.8 Potentially vulnerable - -
Manjaro Unstable
extra
aspell 0.60.8 Potentially vulnerable - -
MidnightBSD mports textproc/aspell 0.60.8 Potentially vulnerable textproc -
MidnightBSD mports textproc/linux-c7-aspell 0.60.6.1 Potentially vulnerable linux -
MSYS2 mingw
x86_64
mingw-w64-x86_64-aspell 0.60.8 Potentially vulnerable - -
MSYS2 mingw
i686
mingw-w64-i686-aspell 0.60.8 Potentially vulnerable - -
MSYS2 msys2
x86_64
aspell 0.60.8 Potentially vulnerable libraries -
MSYS2 msys2
x86_64
aspell-devel 0.60.8 Potentially vulnerable development -
nixpkgs stable 21.11 aspell 0.60.8 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable 22.05 aspell 0.60.8 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable 22.11 aspell 0.60.8 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable 23.05 aspell 0.60.8 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable 23.11 aspell 0.60.8 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs unstable aspell 0.60.8 Potentially vulnerable - fallback-mnt-nix@repology
Npackd Stable Aspell 0.50.3.3.1 Potentially vulnerable Text -
Npackd Stable Aspell 0.50.3.3 Potentially vulnerable Text -
OpenBSD Ports textproc/aspell/core 0.60.8 Potentially vulnerable textproc ports@openbsd.org
openEuler 20.03
source
aspell 0.60.6.1 Potentially vulnerable Unspecified -
openEuler 22.03
source
aspell 0.60.6.1 Potentially vulnerable Unspecified -
OpenIndiana packages
hipster
aspell 0.60.8 Potentially vulnerable System/Text Tools -
openmamba
devel
aspell 0.60.8 Potentially vulnerable System/Internationalization silvan.calarco@mambasoft.it
OpenMandriva 4.0
main/release
aspell 0.60.7-rc1 Potentially vulnerable Text tools bero@lindev.ch
OpenMandriva 4.1
main/release
aspell 0.60.8 Potentially vulnerable Text tools nobodydead@gmail.com
OpenMandriva 4.2
main/release
aspell 0.60.8 Potentially vulnerable Text tools bero@lindev.ch
OpenMandriva 4.3
main/release
aspell 0.60.8 Potentially vulnerable Text tools tpgxyz@gmail.com
OpenMandriva Rolling
main/release
aspell 0.60.8 Potentially vulnerable Text tools bero+massbuild@lindev.ch
OpenMandriva Cooker
main/release
aspell 0.60.8 Potentially vulnerable Text tools bero+massbuild@lindev.ch
OpenPKG aspell 0.60.8 Potentially vulnerable Writing -
openSUSE Leap 42.3
main/oss
aspell 0.60.6.1 Potentially vulnerable Productivity/Text/Spell -
openSUSE Leap 15.0
updates/sle
aspell 0.60.8 Potentially vulnerable Productivity/Text/Spell -
openSUSE Leap 15.0
main/oss
aspell 0.60.6.1 Potentially vulnerable Productivity/Text/Spell -
openSUSE Leap 15.1
updates/sle
aspell 0.60.8 Potentially vulnerable Productivity/Text/Spell -
openSUSE Leap 15.1
main/oss
aspell 0.60.6.1 Potentially vulnerable Productivity/Text/Spell -
openSUSE Leap 15.2
updates/oss
aspell 0.60.8 Potentially vulnerable Productivity/Text/Spell -
openSUSE Leap 15.2
updates/sle
aspell 0.60.8 Potentially vulnerable Productivity/Text/Spell -
openSUSE Leap 15.2
main/oss
aspell 0.60.8 Potentially vulnerable Productivity/Text/Spell -
openSUSE Leap 15.3
main/oss
aspell 0.60.8 Potentially vulnerable Productivity/Text/Spell -
openSUSE Leap 15.3
updates/sle
aspell 0.60.8 Potentially vulnerable Productivity/Text/Spell -
openSUSE Leap 15.4
main/oss
aspell 0.60.8 Potentially vulnerable Productivity/Text/Spell -
openSUSE Leap 15.4
updates/sle
aspell 0.60.8 Potentially vulnerable Productivity/Text/Spell -
openSUSE Leap 15.5
main/oss
aspell 0.60.8 Potentially vulnerable Productivity/Text/Spell -
openSUSE Leap 15.5
updates/sle
aspell 0.60.8 Potentially vulnerable Productivity/Text/Spell -
openSUSE Tumbleweed
src-oss
aspell 0.60.8 Potentially vulnerable Productivity/Text/Spell -
Parabola
extra
aspell 0.60.8 Potentially vulnerable - -
Pardus 21
main
aspell 0.60.8 Potentially vulnerable text agmartin@debian.org
Parrot
parrot/main
aspell 0.60.8 Potentially vulnerable text agmartin@debian.org
Parrot
parrot-updates/main
aspell 0.60.8 Potentially vulnerable text agmartin@debian.org
PCLinuxOS aspell 0.60.6.1 Potentially vulnerable Text tools -
Pisi Linux
main
aspell 0.60.8 Potentially vulnerable app:console admins@pisilinux.org
pkgsrc current textproc/aspell 0.60.8 Potentially vulnerable textproc pkgsrc-users@netbsd.org
PLD Linux aspell 0.60.8 Potentially vulnerable - -
PureOS Amber aspell 0.60.7~20110707 Potentially vulnerable text agmartin@debian.org
PureOS landing aspell 0.60.8 Potentially vulnerable text agmartin@debian.org
Raspbian Oldstable
main
aspell 0.60.8 Potentially vulnerable text agmartin@debian.org
Raspbian Stable
main
aspell 0.60.8 Potentially vulnerable text agmartin@debian.org
Raspbian Testing
main
aspell 0.60.8 Potentially vulnerable text agmartin@debian.org
Ravenports aspell 0.60.8 Potentially vulnerable textproc fallback-mnt-ravenports@repology
Rocky Linux 8
AppStream
aspell 0.60.6.1 Potentially vulnerable Applications/Text infrastructure@rockylinux.org
Rocky Linux 9
CRB
aspell 0.60.8 Potentially vulnerable Unspecified releng@rockylinux.org
Rosa 2014.1
main/release
aspell 0.60.6.1 Potentially vulnerable - -
Rosa 2016.1
main/release
aspell 0.60.6.1 Potentially vulnerable - -
Rosa 2016.1
main/updates
aspell 0.60.6.1 Potentially vulnerable - -
Rosa 2021.1
main/release
aspell 0.60.8 Potentially vulnerable Text tools a.proklov@rosalinux.ru
Rosa Server 6.9
base/release
aspell 0.60.6 Potentially vulnerable Applications/Text andrew.lukoshko@rosalab.ru
Rosa Server 7.3
base/release
aspell 0.60.6.1 Potentially vulnerable Applications/Text alex2048@mail.ru
Rosa Server 7.5
base/release
aspell 0.60.6.1 Potentially vulnerable Applications/Text alex2048@mail.ru
Scientific Linux 7.x aspell 0.60.6.1 Potentially vulnerable Applications/Text -
Scientific Linux 7.x aspell 0.60.6.1 Potentially vulnerable Applications/Text -
Scoop
main
aspell 0.60.8-2 - -
Slackware 14.2
slackware
aspell 0.60.6.1 Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
slackware
aspell 0.60.8 Potentially vulnerable - volkerdi@slackware.com
Slackware current
slackware
aspell 0.60.8 Potentially vulnerable - volkerdi@slackware.com
Slackware64 14.2
slackware64
aspell 0.60.6.1 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
slackware64
aspell 0.60.8 Potentially vulnerable - volkerdi@slackware.com
Slackware64 current
slackware64
aspell 0.60.8 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 14.2
slackware
aspell 0.60.6.1 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 15.0
slackware
aspell 0.60.8 Potentially vulnerable - volkerdi@slackware.com
SliTaz Cooking aspell 0.60.8 Potentially vulnerable system-tools paul@slitaz.org
SliTaz Cooking aspell-dev 0.60.8 Potentially vulnerable development paul@slitaz.org
SliTaz Cooking aspell-lang 0.60.8 Potentially vulnerable system-tools paul@slitaz.org
SliTaz Next aspell 0.60.6.1 Potentially vulnerable system-tools paul@slitaz.org
SliTaz Next aspell-dev 0.60.6.1 Potentially vulnerable development paul@slitaz.org
SliTaz Next aspell 0.60.6.1 Potentially vulnerable system-tools paul@slitaz.org
SliTaz Next aspell-dev 0.60.6.1 Potentially vulnerable development paul@slitaz.org
Spack aspell 0.60.8 Potentially vulnerable - fallback-mnt-spack@repology
T2 SDE aspell 0.60.8 Potentially vulnerable extra/office rene@t2-project.org
Termux aspell 0.60.8 Potentially vulnerable - termux@github
Trisquel 10.0
nabia/main
aspell 0.60.8 Potentially vulnerable text agmartin@debian.org
Trisquel 10.0
nabia-security/main
aspell 0.60.8 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 10.0
nabia-updates/main
aspell 0.60.8 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 11.0
aramo/main
aspell 0.60.8 Potentially vulnerable text agmartin@debian.org
UBI 8
appstream
aspell 0.60.6.1 Potentially vulnerable Applications/Text -
Ubuntu 14.04
trusty/main
aspell 0.60.7~20110707 Potentially vulnerable text pyro@debian.org
Ubuntu 16.04
xenial/main
aspell 0.60.7~20110707 Potentially vulnerable text pyro@debian.org, agmartin@debian.org
Ubuntu 16.04
xenial-updates/main
aspell 0.60.7~20110707 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, agmartin@debian.org
Ubuntu 18.04
bionic/main
aspell 0.60.7~20110707 Potentially vulnerable text pyro@debian.org, agmartin@debian.org
Ubuntu 18.04
bionic-updates/main
aspell 0.60.7~20110707 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, agmartin@debian.org
Ubuntu 20.04
focal-updates/main
aspell 0.60.8 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 20.04
focal/main
aspell 0.60.8 Potentially vulnerable text agmartin@debian.org
Ubuntu 22.04
jammy/main
aspell 0.60.8 Potentially vulnerable text agmartin@debian.org
Ubuntu 23.04
lunar/main
aspell 0.60.8 Potentially vulnerable text agmartin@debian.org
Ubuntu 23.10
mantic/main
aspell 0.60.8 Potentially vulnerable text agmartin@debian.org
Void Linux x86_64
x86_64
aspell 0.60.8 Potentially vulnerable - orphan@voidlinux.org
Void Linux x86_64
x86_64
aspell-devel 0.60.8 Potentially vulnerable - orphan@voidlinux.org
Void Linux x86_64
x86_64
libaspell 0.60.8 Potentially vulnerable - orphan@voidlinux.org
Wikidata GNU Aspell 0.60.8 Potentially vulnerable - -