Versions Packages Information History CVEs Related Badges Report

Versions for calibre

482 package(s) known

Repository Package name Version Category Maintainer(s)
Alpine Linux Edge
testing
calibre 7.1.0 - cowingtonpost@gmail.com
Alpine Linux Edge
testing
calibre-bash-completion 7.1.0 - cowingtonpost@gmail.com
Alpine Linux Edge
testing
calibre-doc 7.1.0 - cowingtonpost@gmail.com
Alpine Linux Edge
testing
calibre-pyc 7.1.0 - cowingtonpost@gmail.com
Alpine Linux Edge
testing
calibre-zsh-completion 7.1.0 - cowingtonpost@gmail.com
ALT Linux p9 calibre 3.42.0 Potentially vulnerable File tools lav@altlinux.ru
ALT Linux p10 calibre 5.23.0 Potentially vulnerable File tools lav@altlinux.ru
ALT Sisyphus calibre 5.44.0 Potentially vulnerable File tools lav@altlinux.ru
AppGet Calibre 4.20.0 Potentially vulnerable - -
Arch
extra
calibre 7.1.0 - -
Arch Linux 32 i686
extra
calibre 6.11.0 Potentially vulnerable - -
Arch Linux 32 i686
extra
calibre-python3 4.23.0 Potentially vulnerable - -
Arch Linux 32 i686
extra
calibre-common 4.23.0 Potentially vulnerable - -
Arch Linux 32 pentium4
extra
calibre 6.11.0 Potentially vulnerable - -
Arch Linux 32 pentium4
extra
calibre-common 4.23.0 Potentially vulnerable - -
Arch Linux 32 pentium4
extra
calibre-python3 4.23.0 Potentially vulnerable - -
Arch Linux ARM aarch64
extra
calibre 6.29.0 - -
Arch Linux ARM aarch64
community
calibre 6.17.0 Potentially vulnerable - -
AUR calibre-git 6.22.0.r1.gca2b4e02ed - alerque@aur
Chocolatey Calibre 6.29.0 - -
Debian 10
buster/main
calibre 3.39.1 Potentially vulnerable text norbert@preining.info, mpitt@debian.org, nsteeves@gmail.com
Debian 11
bullseye/main
calibre 5.12.0 Potentially vulnerable text team+calibre@tracker.debian.org, mpitt@debian.org, norbert@preining.info, nsteeves@gmail.com, yokota.hgml@gmail.com
Debian 11 Backports
bullseye-backports/main
calibre 5.44.0 Potentially vulnerable misc team+calibre@tracker.debian.org, mpitt@debian.org, sten@debian.org, yokota.hgml@gmail.com
Debian 12
bookworm/main
calibre 6.13.0 Potentially vulnerable text team+calibre@tracker.debian.org, mpitt@debian.org, sten@debian.org, yokota.hgml@gmail.com
Debian 13
trixie/main
calibre 7.1.0 text team+calibre@tracker.debian.org, mpitt@debian.org, sten@debian.org, yokota.hgml@gmail.com
Debian Unstable
sid/main
calibre 7.1.0 text team+calibre@tracker.debian.org, mpitt@debian.org, sten@debian.org, yokota.hgml@gmail.com
Deepin
main
calibre 3.39.1.1+rb2 Potentially vulnerable - norbert@preining.info, mpitt@debian.org, nsteeves@gmail.com
Devuan 3.0
beowulf/main
calibre 3.39.1 Potentially vulnerable text norbert@preining.info, mpitt@debian.org, nsteeves@gmail.com
Devuan 4.0
chimaera/main
calibre 5.12.0 Potentially vulnerable text team+calibre@tracker.debian.org, mpitt@debian.org, norbert@preining.info, nsteeves@gmail.com, yokota.hgml@gmail.com
Devuan Unstable
unstable/main
calibre 7.1.0 text team+calibre@tracker.debian.org, mpitt@debian.org, sten@debian.org, yokota.hgml@gmail.com
DistroWatch.com calibre 7.1.0 - -
Exherbo
media
app-text/calibre 6.17.0 Potentially vulnerable app-text fallback-mnt-exherbo@repology
Exherbo
media
app-text/calibre 5.44.0 Potentially vulnerable app-text fallback-mnt-exherbo@repology
Fedora 26
updates
calibre 3.19.0 Potentially vulnerable Applications/Multimedia -
Fedora 26
release
calibre 3.0.0 Potentially vulnerable Applications/Multimedia -
Fedora 27
updates
calibre 3.19.0 Potentially vulnerable Applications/Multimedia -
Fedora 27
release
calibre 3.4.0 Potentially vulnerable Applications/Multimedia -
Fedora 28
updates
calibre 3.34.0 Potentially vulnerable Applications/Multimedia -
Fedora 28
release
calibre 3.19.0 Potentially vulnerable Applications/Multimedia -
Fedora 29
updates
calibre 3.36.0 Potentially vulnerable Unspecified -
Fedora 29
release
calibre 3.29.0 Potentially vulnerable Applications/Multimedia -
Fedora 30
updates
calibre 3.36.0 Potentially vulnerable Unspecified -
Fedora 30
release
calibre 3.36.0 Potentially vulnerable Unspecified -
Fedora 31
updates
calibre 4.22.0 Potentially vulnerable Unspecified -
Fedora 31
release
calibre 4.0.0 Potentially vulnerable Unspecified -
Fedora 32
updates
calibre 4.22.0 Potentially vulnerable Unspecified -
Fedora 32
release
calibre 4.13.0 Potentially vulnerable Unspecified -
Fedora 33
release
calibre 4.23.0 Potentially vulnerable Unspecified -
Fedora 33
updates
calibre 4.23.0 Potentially vulnerable Unspecified -
Fedora 34
updates
calibre 4.23.0 Potentially vulnerable Unspecified -
Fedora 34
release
calibre 4.23.0 Potentially vulnerable Unspecified -
Fedora 35
updates
calibre 5.33.2 Potentially vulnerable Unspecified -
Fedora 35
release
calibre 5.28.0 Potentially vulnerable Unspecified -
Fedora 36
updates
calibre 5.42.0 Potentially vulnerable Unspecified -
Fedora 36
release
calibre 5.39.1 Potentially vulnerable Unspecified -
Fedora 37
release
calibre 5.43.0 Potentially vulnerable Unspecified -
Fedora 38
updates
calibre 5.43.0 Potentially vulnerable Unspecified -
Fedora 38
release
calibre 5.43.0 Potentially vulnerable Unspecified -
Fedora 39
updates
calibre 6.28.1 Unspecified -
Fedora 39
development
calibre 6.21.0 Unspecified -
Fedora Rawhide
development
calibre 7.0.0 Unspecified -
FreeBSD Ports deskutils/calibre 7.1.0 deskutils madpilot@freebsd.org
freshcode.club calibre 7.1 - -
Gentoo app-text/calibre 7.1.0 app-text zmedico@gentoo.org, eschwartz93@gmail.com
Gentoo app-text/calibre 7.0.0 app-text zmedico@gentoo.org, eschwartz93@gmail.com
Gentoo app-text/calibre 6.29.0 app-text zmedico@gentoo.org, eschwartz93@gmail.com
Gentoo app-text/calibre 5.44.0 Potentially vulnerable app-text zmedico@gentoo.org, eschwartz93@gmail.com
Gentoo app-text/calibre 5.44.0 Potentially vulnerable app-text zmedico@gentoo.org, eschwartz93@gmail.com
GNU Guix calibre 5.44.0 Potentially vulnerable - -
HaikuPorts master app-text/calibre 5.32.0 Potentially vulnerable app-text -
Homebrew Casks calibre 6.29.0 - -
just-install calibre latest - -
Kali Linux Rolling
main
calibre 7.1.0 text team+calibre@tracker.debian.org, mpitt@debian.org, sten@debian.org, yokota.hgml@gmail.com
KaOS
apps
calibre 7.1.0 - demm@kaosx.us
LiGurOS stable app-text/calibre 5.44.0 Potentially vulnerable app-text zmedico@gentoo.org
LiGurOS stable app-text/calibre 5.43.0 Potentially vulnerable app-text zmedico@gentoo.org
LiGurOS develop app-text/calibre 7.1.0 app-text zmedico@gentoo.org, eschwartz93@gmail.com
LiGurOS develop app-text/calibre 7.0.0 app-text zmedico@gentoo.org, eschwartz93@gmail.com
LiGurOS develop app-text/calibre 6.29.0 app-text zmedico@gentoo.org, eschwartz93@gmail.com
LiGurOS develop app-text/calibre 5.44.0 Potentially vulnerable app-text zmedico@gentoo.org, eschwartz93@gmail.com
LiGurOS develop app-text/calibre 5.44.0 Potentially vulnerable app-text zmedico@gentoo.org, eschwartz93@gmail.com
Mageia 8
core/updates
calibre 4.23.0 Potentially vulnerable Office/Utilities -
Mageia 8
core/release
calibre 4.23.0 Potentially vulnerable Office/Utilities -
Mageia cauldron
core/release
calibre 7.1.0 Office/Utilities -
Manjaro Stable
extra
calibre 6.29.0 - -
Manjaro Testing
extra
calibre 6.29.0 - -
Manjaro Unstable
extra
calibre 7.1.0 - -
MX Linux MX-19
main
calibre 3.48.0 Potentially vulnerable text stevep@mxlinux.org, mpitt@debian.org, nsteeves@gmail.com
MX Linux MX-21 Testing calibre 5.44.0 Potentially vulnerable text stevep@mxlinux.org, mpitt@debian.org, sten@debian.org, yokota.hgml@gmail.com
nixpkgs stable 21.11 calibre 5.31.1 Potentially vulnerable - mail@pascal-wittmann.de, torres.anderson.85@protonmail.com
nixpkgs stable 22.05 calibre 5.42.0 Potentially vulnerable - mail@pascal-wittmann.de, torres.anderson.85@protonmail.com
nixpkgs stable 22.11 calibre 6.8.0 Potentially vulnerable - mail@pascal-wittmann.de, torres.anderson.85@protonmail.com
nixpkgs stable 23.05 calibre 6.17.0 Potentially vulnerable - mail@pascal-wittmann.de, torres.anderson.85@protonmail.com
nixpkgs unstable calibre 7.1.0 - mail@pascal-wittmann.de
Npackd Stable Calibre 5.44 Potentially vulnerable Text -
Npackd Stable Calibre 5.43 Potentially vulnerable Text -
Npackd Stable Calibre 5.42 Potentially vulnerable Text -
Npackd Stable Calibre 5.41 Potentially vulnerable Text -
Npackd Stable Calibre 5.40 Potentially vulnerable Text -
Npackd Stable Calibre 5.39.1 Potentially vulnerable Text -
Npackd Stable Calibre 5.39 Potentially vulnerable Text -
Npackd Stable Calibre 5.38 Potentially vulnerable Text -
Npackd Stable Calibre 5.37 Potentially vulnerable Text -
Npackd Stable Calibre 5.36 Potentially vulnerable Text -
Npackd Stable Calibre 5.35 Potentially vulnerable Text -
Npackd Stable Calibre 5.34 Potentially vulnerable Text -
Npackd Stable Calibre 5.33.2 Potentially vulnerable Text -
Npackd Stable Calibre 5.33 Potentially vulnerable Text -
Npackd Stable Calibre 5.32 Potentially vulnerable Text -
Npackd Stable Calibre 5.31.1 Potentially vulnerable Text -
Npackd Stable Calibre 5.31 Potentially vulnerable Text -
Npackd Stable Calibre 5.30 Potentially vulnerable Text -
Npackd Stable Calibre 5.29 Potentially vulnerable Text -
Npackd Stable Calibre 5.28 Potentially vulnerable Text -
Npackd Stable Calibre 5.27 Potentially vulnerable Text -
Npackd Stable Calibre 5.26 Potentially vulnerable Text -
Npackd Stable Calibre 5.25 Potentially vulnerable Text -
Npackd Stable Calibre 5.24 Potentially vulnerable Text -
Npackd Stable Calibre 5.23 Potentially vulnerable Text -
Npackd Stable Calibre 5.22.1 Potentially vulnerable Text -
Npackd Stable Calibre 5.22 Potentially vulnerable Text -
Npackd Stable Calibre 5.21 Potentially vulnerable Text -
Npackd Stable Calibre 5.20 Potentially vulnerable Text -
Npackd Stable Calibre 5.19 Potentially vulnerable Text -
Npackd Stable Calibre 5.18 Potentially vulnerable Text -
Npackd Stable Calibre 5.17 Potentially vulnerable Text -
Npackd Stable Calibre 5.16.1 Potentially vulnerable Text -
Npackd Stable Calibre 5.16 Potentially vulnerable Text -
Npackd Stable Calibre 5.15 Potentially vulnerable Text -
Npackd Stable Calibre 5.14 Potentially vulnerable Text -
Npackd Stable Calibre 5.13 Potentially vulnerable Text -
Npackd Stable Calibre 5.12 Potentially vulnerable Text -
Npackd Stable Calibre 5.11 Potentially vulnerable Text -
Npackd Stable Calibre 5.10.1 Potentially vulnerable Text -
Npackd Stable Calibre 5.10 Potentially vulnerable Text -
Npackd Stable Calibre 5.9 Potentially vulnerable Text -
Npackd Stable Calibre 5.8.1 Potentially vulnerable Text -
Npackd Stable Calibre 5.7.2 Potentially vulnerable Text -
Npackd Stable Calibre 5.7 Potentially vulnerable Text -
Npackd Stable Calibre 5.6 Potentially vulnerable Text -
Npackd Stable Calibre 5.5 Potentially vulnerable Text -
Npackd Stable Calibre 5.4.2 Potentially vulnerable Text -
Npackd Stable Calibre 5.3 Potentially vulnerable Text -
Npackd Stable Calibre 5.2 Potentially vulnerable Text -
Npackd Stable Calibre 5.0.1 Potentially vulnerable Text -
Npackd Stable Calibre 4.22 Potentially vulnerable Text -
Npackd Stable Calibre 4.21 Potentially vulnerable Text -
Npackd Stable Calibre 4.20 Potentially vulnerable Text -
Npackd Stable Calibre 4.19 Potentially vulnerable Text -
Npackd Stable Calibre 4.18 Potentially vulnerable Text -
Npackd Stable Calibre 4.17 Potentially vulnerable Text -
Npackd Stable Calibre 4.16 Potentially vulnerable Text -
Npackd Stable Calibre 4.15 Potentially vulnerable Text -
Npackd Stable Calibre 4.14 Potentially vulnerable Text -
Npackd Stable Calibre 4.13 Potentially vulnerable Text -
Npackd Stable Calibre 4.12 Potentially vulnerable Text -
Npackd Stable Calibre 4.11.2 Potentially vulnerable Text -
Npackd Stable Calibre 4.10.1 Potentially vulnerable Text -
Npackd Stable Calibre 4.9.1 Potentially vulnerable Text -
Npackd Stable Calibre 4.8 Potentially vulnerable Text -
Npackd Stable Calibre 4.7 Potentially vulnerable Text -
Npackd Stable Calibre 4.6 Potentially vulnerable Text -
Npackd Stable Calibre 4.5 Potentially vulnerable Text -
Npackd Stable Calibre 4.4 Potentially vulnerable Text -
Npackd Stable Calibre 4.3 Potentially vulnerable Text -
Npackd Stable Calibre 4.2 Potentially vulnerable Text -
Npackd Stable Calibre 4.1 Potentially vulnerable Text -
Npackd Stable Calibre 3.48 Potentially vulnerable Text -
Npackd Stable Calibre 3.47.1 Potentially vulnerable Text -
Npackd Stable Calibre 3.46 Potentially vulnerable Text -
Npackd Stable Calibre 3.45.2 Potentially vulnerable Text -
Npackd Stable Calibre 3.44 Potentially vulnerable Text -
Npackd Stable Calibre 3.43 Potentially vulnerable Text -
Npackd Stable Calibre 3.42 Potentially vulnerable Text -
Npackd Stable Calibre 3.41.3 Potentially vulnerable Text -
Npackd Stable Calibre 3.40.1 Potentially vulnerable Text -
Npackd Stable Calibre 3.39.1 Potentially vulnerable Text -
Npackd Stable Calibre 3.38.1 Potentially vulnerable Text -
Npackd Stable Calibre 3.37 Potentially vulnerable Text -
Npackd Stable Calibre 3.36 Potentially vulnerable Text -
Npackd Stable Calibre 3.35 Potentially vulnerable Text -
Npackd Stable Calibre 3.34 Potentially vulnerable Text -
Npackd Stable Calibre 3.33.1 Potentially vulnerable Text -
Npackd Stable Calibre 3.32 Potentially vulnerable Text -
Npackd Stable Calibre 3.31 Potentially vulnerable Text -
Npackd Stable Calibre 3.30 Potentially vulnerable Text -
Npackd Stable Calibre 3.29 Potentially vulnerable Text -
Npackd Stable Calibre 3.28 Potentially vulnerable Text -
Npackd Stable Calibre 3.27.1 Potentially vulnerable Text -
Npackd Stable Calibre 3.26.1 Potentially vulnerable Text -
Npackd Stable Calibre 3.25 Potentially vulnerable Text -
Npackd Stable Calibre 3.24.2 Potentially vulnerable Text -
Npackd Stable Calibre 3.23 Potentially vulnerable Text -
Npackd Stable Calibre 3.21 Potentially vulnerable Text -
Npackd Stable Calibre 3.20 Potentially vulnerable Text -
Npackd Stable Calibre 3.19 Potentially vulnerable Text -
Npackd Stable Calibre 3.18 Potentially vulnerable Text -
Npackd Stable Calibre 3.17 Potentially vulnerable Text -
Npackd Stable Calibre 3.16 Potentially vulnerable Text -
Npackd Stable Calibre 3.15 Potentially vulnerable Text -
Npackd Stable Calibre 3.14 Potentially vulnerable Text -
Npackd Stable Calibre 3.13 Potentially vulnerable Text -
Npackd Stable Calibre 3.12 Potentially vulnerable Text -
Npackd Stable Calibre 3.11.1 Potentially vulnerable Text -
Npackd Stable Calibre 3.10 Potentially vulnerable Text -
Npackd Stable Calibre 3.9 Potentially vulnerable Text -
Npackd Stable Calibre 3.8 Potentially vulnerable Text -
Npackd Stable Calibre 3.7 Potentially vulnerable Text -
Npackd Stable Calibre 3.6 Potentially vulnerable Text -
Npackd Stable Calibre 3.5 Potentially vulnerable Text -
Npackd Stable Calibre 3.4 Potentially vulnerable Text -
Npackd Stable Calibre 3.3 Potentially vulnerable Text -
Npackd Stable Calibre 3.2.1 Potentially vulnerable Text -
Npackd Stable Calibre 2.83 Potentially vulnerable Text -
Npackd Stable Calibre 2.78 Potentially vulnerable Text -
Npackd Stable Calibre 2.69 Potentially vulnerable Text -
Npackd Stable Calibre 2.62 Potentially vulnerable Text -
Npackd Stable Calibre 2.55 Potentially vulnerable Text -
Npackd Stable Calibre 2.49 Potentially vulnerable Text -
Npackd Stable Calibre 2.41 Potentially vulnerable Text -
Npackd Stable Calibre 2.32.1 Potentially vulnerable Text -
Npackd Stable Calibre 2.26 Potentially vulnerable Text -
Npackd Stable Calibre 2.15 Potentially vulnerable Text -
Npackd Stable Calibre 2.5 Potentially vulnerable Text -
Npackd Stable Calibre 1.43 Potentially vulnerable Text -
Npackd Stable Calibre 1.31 Potentially vulnerable Text -
Npackd Stable Calibre 1.19 Potentially vulnerable Text -
Npackd Stable Calibre 1.5 Potentially vulnerable Text -
Npackd Stable Calibre 0.9.43 Potentially vulnerable Text -
Npackd Stable Calibre 0.9.38 Potentially vulnerable Text -
Npackd Stable Calibre 0.9.26 Potentially vulnerable Text -
Npackd Stable Calibre 0.9.25 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 7.1 Text -
Npackd Stable64 Calibre 64 bit 7 Text -
Npackd Stable64 Calibre 64 bit 6.29 Text -
Npackd Stable64 Calibre 64 bit 6.28.1 Text -
Npackd Stable64 Calibre 64 bit 6.28 Text -
Npackd Stable64 Calibre 64 bit 6.27 Text -
Npackd Stable64 Calibre 64 bit 6.26 Text -
Npackd Stable64 Calibre 64 bit 6.25 Text -
Npackd Stable64 Calibre 64 bit 6.24 Text -
Npackd Stable64 Calibre 64 bit 6.23 Text -
Npackd Stable64 Calibre 64 bit 6.22 Text -
Npackd Stable64 Calibre 64 bit 6.21 Text -
Npackd Stable64 Calibre 64 bit 6.20 Text -
Npackd Stable64 Calibre 64 bit 6.19.1 Text -
Npackd Stable64 Calibre 64 bit 6.18.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 6.18 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 6.17 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 6.16 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 6.15.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 6.15 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 6.14.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 6.14 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 6.13 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 6.12 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 6.11 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 6.10 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 6.9 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 6.8 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 6.7.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 6.7 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 6.6.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 6.6 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 6.5 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 6.4 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 6.3 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 6.2.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 6.2 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 6.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 6 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.44 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.43 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.42 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.41 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.40 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.39.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.39 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.38 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.37 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.36 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.35 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.34 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.33.2 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.33 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.32 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.31.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.31 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.30 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.29 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.28 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.27 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.26 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.25 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.24 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.23 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.22.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.22 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.21 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.20 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.19 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.18 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.17 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.16.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.16 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.15 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.14 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.13 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.12 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.11 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.10.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.10 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.9 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.8.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.7.2 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.3 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.2 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.0.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.22 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.21 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.20 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.19 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.18 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.17 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.16 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.15 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.14 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.13 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.12 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.11.2 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.10.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.9.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.8 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.7 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.6 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.5 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.4 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.3 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.2 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.48 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.47.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.46 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.45.2 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.44 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.43 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.42 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.41.3 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.40.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.39.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.38.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.37 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.36 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.35 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.34 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.33.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.32 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.31 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.30 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.29 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.28 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.27.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.26.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.25 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.24.2 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.23 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.21 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.20 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.19 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.18 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.17 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.16 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.15 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.14 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.13 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.12 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.11.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.10 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.9 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.8 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.7 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.6 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.5 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.4 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.3 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.2.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 2.83 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 2.78 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 2.69 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 2.62 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 2.55 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 2.49 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 2.41 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 2.32.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 2.26 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 2.15 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 2.5 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 1.43 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 1.31 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 1.19 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 1.5 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 0.9.43 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 0.9.38 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 0.9.26 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 0.9.25 Potentially vulnerable Text -
OpenBSD Ports textproc/calibre 5.44.0 Potentially vulnerable textproc ports@openbsd.org
openmamba
devel
calibre 7.1.0 Graphical Desktop/Applications/Multimedia silvan.calarco@mambasoft.it
OpenMandriva 4.1
unsupported/release
calibre 4.6.0 Potentially vulnerable Office angrypenguinpoland@gmail.com
OpenMandriva 4.2
main/release
calibre 5.9.0 Potentially vulnerable Office bero@lindev.ch
OpenMandriva 4.2
unsupported/release
calibre 4.21.0 Potentially vulnerable Office bero@lindev.ch
OpenMandriva 4.3
main/release
calibre 5.35.0 Potentially vulnerable Office bero@lindev.ch
OpenMandriva 4.3
unsupported/release
calibre 4.21.0 Potentially vulnerable Office bero@lindev.ch
OpenMandriva Rolling
main/release
calibre 7.0.0 Office bero@lindev.ch
OpenMandriva Cooker
main/release
calibre 7.0.0 Office bero@lindev.ch
openSUSE Leap 42.3
main/oss
calibre 2.85.1 Potentially vulnerable Productivity/Other -
openSUSE Leap 15.0
main/oss
calibre 3.23.0 Potentially vulnerable Productivity/Other -
openSUSE Leap 15.1
main/oss
calibre 3.40.1 Potentially vulnerable Productivity/Other -
openSUSE Leap 15.2
main/oss
calibre 3.48.0 Potentially vulnerable Productivity/Other -
openSUSE Leap 15.3
main/oss
calibre 3.48.0 Potentially vulnerable Productivity/Other -
openSUSE Tumbleweed
src-oss
calibre 7.1.0 Productivity/Other -
Pardus 21
main
calibre 5.12.0 Potentially vulnerable text team+calibre@tracker.debian.org, mpitt@debian.org, norbert@preining.info, nsteeves@gmail.com, yokota.hgml@gmail.com
Parrot
parrot-updates/main
calibre 5.12.0 Potentially vulnerable text team+calibre@tracker.debian.org, mpitt@debian.org, norbert@preining.info, nsteeves@gmail.com, yokota.hgml@gmail.com
Parrot
parrot/main
calibre 5.12.0 Potentially vulnerable text team+calibre@tracker.debian.org, mpitt@debian.org, norbert@preining.info, nsteeves@gmail.com, yokota.hgml@gmail.com
PCLinuxOS calibre 7.1.0 Office -
pkgsrc current misc/calibre 5.44.0 Potentially vulnerable misc pkgsrc-users@netbsd.org
PLD Linux calibre 6.23.0 - -
PureOS Amber calibre 3.39.1 Potentially vulnerable text norbert@preining.info, mpitt@debian.org, nsteeves@gmail.com
PureOS landing calibre 6.13.0 Potentially vulnerable text team+calibre@tracker.debian.org, mpitt@debian.org, sten@debian.org, yokota.hgml@gmail.com
Raspbian Oldstable
main
calibre 5.12.0 Potentially vulnerable text team+calibre@tracker.debian.org, mpitt@debian.org, norbert@preining.info, nsteeves@gmail.com, yokota.hgml@gmail.com
Raspbian Stable
main
calibre 6.13.0 Potentially vulnerable text team+calibre@tracker.debian.org, mpitt@debian.org, sten@debian.org, yokota.hgml@gmail.com
Raspbian Testing
main
calibre 7.1.0 text team+calibre@tracker.debian.org, mpitt@debian.org, sten@debian.org, yokota.hgml@gmail.com
Rosa 2014.1
contrib/updates
calibre 2.85.1 Potentially vulnerable - -
Rosa 2014.1
contrib/release
calibre 1.34.0 Potentially vulnerable - -
Rosa 2016.1
contrib/updates
calibre 3.45.2 Potentially vulnerable - -
Rosa 2016.1
contrib/release
calibre 2.81.0 Potentially vulnerable - -
Rosa 2021.1
contrib/release
calibre 5.44.0 Potentially vulnerable Office alexander@mezon.ru
Scoop
extras
calibre-normal 7.1.0 - -
Scoop
extras
calibre 7.1.0 - -
Solus calibre 7.1.0 office.viewers algent@protonmail.com
Solus calibre-dbginfo 7.1.0 debug algent@protonmail.com
Trisquel 10.0
nabia-updates/main
calibre 4.99.4+really4.12.0 Potentially vulnerable universe/text ubuntu-devel-discuss@lists.ubuntu.com, mpitt@debian.org, nsteeves@gmail.com, yokota.hgml@gmail.com
Trisquel 10.0
nabia/main
calibre 4.99.4+really4.12.0 Potentially vulnerable universe/text norbert@preining.info, mpitt@debian.org, nsteeves@gmail.com, yokota.hgml@gmail.com
Trisquel 11.0
aramo/main
calibre 5.37.0 Potentially vulnerable universe/text team+calibre@tracker.debian.org, mpitt@debian.org, norbert@preining.info, sten@debian.org, yokota.hgml@gmail.com
Ubuntu 14.04
trusty-updates/universe
calibre 1.25.0 Potentially vulnerable universe/text ubuntu-devel-discuss@lists.ubuntu.com, mpitt@debian.org
Ubuntu 14.04
trusty/universe
calibre 1.25.0 Potentially vulnerable universe/text little_miry@yahoo.es, mpitt@debian.org
Ubuntu 16.04
xenial/universe
calibre 2.55.0 Potentially vulnerable universe/text little_miry@yahoo.es, mpitt@debian.org
Ubuntu 16.04
xenial-updates/universe
calibre 2.55.0 Potentially vulnerable universe/text ubuntu-devel-discuss@lists.ubuntu.com, mpitt@debian.org
Ubuntu 18.04
bionic/universe
calibre 3.21.0 Potentially vulnerable universe/text preining@debian.org, mpitt@debian.org
Ubuntu 20.04
focal/universe
calibre 4.99.4+really4.12.0 Potentially vulnerable universe/text norbert@preining.info, mpitt@debian.org, nsteeves@gmail.com, yokota.hgml@gmail.com
Ubuntu 20.04
focal-updates/universe
calibre 4.99.4+really4.12.0 Potentially vulnerable universe/text ubuntu-devel-discuss@lists.ubuntu.com, mpitt@debian.org, nsteeves@gmail.com, yokota.hgml@gmail.com
Ubuntu 22.04
jammy/universe
calibre 5.37.0 Potentially vulnerable universe/text team+calibre@tracker.debian.org, mpitt@debian.org, norbert@preining.info, sten@debian.org, yokota.hgml@gmail.com
Ubuntu 23.04
lunar/universe
calibre 6.11.0 Potentially vulnerable universe/text team+calibre@tracker.debian.org, mpitt@debian.org, sten@debian.org, yokota.hgml@gmail.com
Ubuntu 23.10
mantic/universe
calibre 6.24.0 universe/text team+calibre@tracker.debian.org, mpitt@debian.org, sten@debian.org, yokota.hgml@gmail.com
Void Linux x86_64
x86_64
calibre 6.17.0 Potentially vulnerable - dem.procopiou@gmail.com
Wikidata Calibre 7.1.0 - -
winget calibre 7.1.0 calibre -
winget calibre 7.0.0 calibre -
winget calibre 6.29.0 calibre -
winget calibre 6.17.0 Potentially vulnerable calibre -
winget calibre 6.16.0 Potentially vulnerable calibre -
winget calibre 6.15.1 Potentially vulnerable calibre -
winget calibre 6.15.0 Potentially vulnerable calibre -
winget calibre 6.14.1 Potentially vulnerable calibre -
winget calibre 6.14.0 Potentially vulnerable calibre -
winget calibre 6.13.0 Potentially vulnerable calibre -
winget calibre 6.12.0 Potentially vulnerable calibre -
winget calibre 6.11.0 Potentially vulnerable calibre -
winget calibre 6.10.0 Potentially vulnerable calibre -
winget calibre 6.9.0 Potentially vulnerable calibre -
winget calibre 6.8.0 Potentially vulnerable calibre -
winget calibre 6.7.1 Potentially vulnerable calibre -
winget calibre 6.7.0 Potentially vulnerable calibre -
winget calibre 6.6.1 Potentially vulnerable calibre -
winget calibre 6.6.0 Potentially vulnerable calibre -
winget calibre 6.5.0 Potentially vulnerable calibre -
winget calibre 6.4.0 Potentially vulnerable calibre -
winget calibre 6.3.0 Potentially vulnerable calibre -
winget calibre 6.2.1 Potentially vulnerable calibre -
winget calibre 6.2.0 Potentially vulnerable calibre -
winget calibre 6.1.0 Potentially vulnerable calibre -
winget calibre 6.0.0 Potentially vulnerable calibre -
winget calibre 4.21.0 Potentially vulnerable calibre -