Versions Packages Information History CVEs Related Badges Report

Versions for curl

502 package(s) known

Repository Package name Version Category Maintainer(s)
Adélie Linux current
system
curl-dev 7.68.0 - fallback-mnt-adelie@repology
Adélie Linux current
system
curl-doc 7.68.0 - fallback-mnt-adelie@repology
Adélie Linux current
system
curl-dbg 7.68.0 - fallback-mnt-adelie@repology
Adélie Linux current
system
libcurl 7.68.0 - fallback-mnt-adelie@repology
Adélie Linux current
system
curl 7.68.0 - fallback-mnt-adelie@repology
AIX Open Source Packages curl 7.65.3 Potentially vulnerable - -
AIX Open Source Packages curl 7.65.2 Potentially vulnerable - -
AIX Open Source Packages curl 7.65.1 Potentially vulnerable - -
AIX Open Source Packages curl 7.65.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.64.1 Potentially vulnerable - -
AIX Open Source Packages curl 7.64.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.63.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.62.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.61.1 Potentially vulnerable - -
AIX Open Source Packages curl 7.60.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.59.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.57.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.55.1 Potentially vulnerable - -
AIX Open Source Packages curl 7.55.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.54.1 Potentially vulnerable - -
AIX Open Source Packages curl 7.54.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.53.1 Potentially vulnerable - -
AIX Open Source Packages curl 7.53.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.52.1 Potentially vulnerable - -
AIX Open Source Packages curl 7.52.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.51.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.50.3 Potentially vulnerable - -
AIX Open Source Packages curl 7.50.2 Potentially vulnerable - -
AIX Open Source Packages curl 7.50.1 Potentially vulnerable - -
AIX Open Source Packages curl 7.50.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.49.1 Potentially vulnerable - -
AIX Open Source Packages curl 7.49.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.48.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.47.1 Potentially vulnerable - -
AIX Open Source Packages curl 7.47.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.47.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.46.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.45.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.44.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.43.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.42.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.41.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.40.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.39.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.38.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.37.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.36.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.35.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.34.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.33.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.32.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.31.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.30.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.29.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.28.1 Potentially vulnerable - -
AIX Open Source Packages curl 7.28.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.27.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.26.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.26.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.25.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.24.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.24.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.23.1 Potentially vulnerable - -
AIX Open Source Packages curl 7.23.1 Potentially vulnerable - -
AIX Open Source Packages curl 7.22.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.22.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.21.7 Potentially vulnerable - -
AIX Open Source Packages curl 7.21.7 Potentially vulnerable - -
AIX Open Source Packages curl 7.21.3 Potentially vulnerable - -
AIX Open Source Packages curl 7.21.2 Potentially vulnerable - -
AIX Open Source Packages curl 7.21.1 Potentially vulnerable - -
AIX Open Source Packages curl 7.21.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.20.1 Potentially vulnerable - -
AIX Open Source Packages curl 7.20.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.19.7 Potentially vulnerable - -
AIX Open Source Packages curl 7.19.6 Potentially vulnerable - -
AIX Open Source Packages curl 7.19.6 Potentially vulnerable - -
AIX Open Source Packages curl 7.19.5 Potentially vulnerable - -
AIX Open Source Packages curl 7.19.4 Potentially vulnerable - -
AIX Open Source Packages curl 7.19.3 Potentially vulnerable - -
AIX Open Source Packages curl 7.19.2 Potentially vulnerable - -
AIX Open Source Packages curl 7.19.1 Potentially vulnerable - -
AIX Open Source Packages curl 7.19.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.18.2 Potentially vulnerable - -
AIX Open Source Packages curl 7.18.1 Potentially vulnerable - -
AIX Open Source Packages curl 7.18.0 Potentially vulnerable - -
AIX Open Source Packages curl 7.17.1 Potentially vulnerable - -
Alpine Linux 3.8
main
curl 7.61.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
libcurl 7.61.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
curl-doc 7.61.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
curl-dev 7.61.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
curl-dbg 7.61.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
curl-dbg 7.64.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
curl 7.64.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
libcurl 7.64.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
curl-dev 7.64.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
curl-doc 7.64.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
libcurl 7.66.0 - ncopa@alpinelinux.org
Alpine Linux 3.10
main
curl-dbg 7.66.0 - ncopa@alpinelinux.org
Alpine Linux 3.10
main
curl-static 7.66.0 - ncopa@alpinelinux.org
Alpine Linux 3.10
main
curl-dev 7.66.0 - ncopa@alpinelinux.org
Alpine Linux 3.10
main
curl-doc 7.66.0 - ncopa@alpinelinux.org
Alpine Linux 3.10
main
curl 7.66.0 - ncopa@alpinelinux.org
Alpine Linux 3.11
main
curl 7.67.0 - ncopa@alpinelinux.org
Alpine Linux 3.11
main
curl-static 7.67.0 - ncopa@alpinelinux.org
Alpine Linux 3.11
main
curl-doc 7.67.0 - ncopa@alpinelinux.org
Alpine Linux 3.11
main
curl-dev 7.67.0 - ncopa@alpinelinux.org
Alpine Linux 3.11
main
curl-dbg 7.67.0 - ncopa@alpinelinux.org
Alpine Linux 3.11
main
libcurl 7.67.0 - ncopa@alpinelinux.org
Alpine Linux Edge
main
curl 7.69.1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
curl-static 7.69.1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
curl-dev 7.69.1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
curl-doc 7.69.1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
libcurl 7.69.1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
curl-dbg 7.69.1 - ncopa@alpinelinux.org
ALT Linux p9 curl 7.65.0 Potentially vulnerable Networking/File transfer rider@altlinux.org
ALT Sisyphus curl 7.70.0 Networking/File transfer rider@altlinux.org
Amazon Linux 1
updates
curl 7.61.1 Potentially vulnerable Unspecified -
Amazon Linux 1
updates
curl 7.61.1 Potentially vulnerable Unspecified -
Amazon Linux 1
updates
curl 7.61.1 Potentially vulnerable Unspecified -
Amazon Linux 1
main
curl 7.53.1 Potentially vulnerable Applications/Internet -
Amazon Linux 1
updates
curl 7.53.1 Potentially vulnerable Applications/Internet -
Amazon Linux 1
updates
curl 7.53.1 Potentially vulnerable Applications/Internet -
Amazon Linux 2 curl 7.61.1 Potentially vulnerable Unspecified -
Amazon Linux 2 curl 7.61.1 Potentially vulnerable Unspecified -
Amazon Linux 2 curl 7.61.1 Potentially vulnerable Unspecified -
Amazon Linux 2 curl 7.55.1 Potentially vulnerable Applications/Internet -
Amazon Linux 2 curl 7.55.1 Potentially vulnerable Applications/Internet -
Amazon Linux 2 curl 7.55.1 Potentially vulnerable Applications/Internet -
Amazon Linux 2 curl 7.55.1 Potentially vulnerable Applications/Internet -
Amazon Linux 2 curl 7.55.1 Potentially vulnerable Applications/Internet -
Amazon Linux 2 curl 7.55.1 Potentially vulnerable Applications/Internet -
Amazon Linux 2 curl 7.55.1 Potentially vulnerable Applications/Internet -
antiX-19
main
curl 7.61.0 Potentially vulnerable main ghedo@debian.org, ijackson@chiark.greenend.org.uk
AOSC curl 7.68.0 utils fallback-mnt-aosc@repology
AOSC curl+32 7.67.0 utils fallback-mnt-aosc@repology
Arch
core
curl 7.70.0 - -
Arch
community
libcurl-compat 7.70.0 - -
Arch
community
libcurl-gnutls 7.70.0 - -
Arch
multilib
lib32-curl 7.70.0 - -
Arch
multilib
lib32-libcurl-compat 7.70.0 - -
Arch
multilib
lib32-libcurl-gnutls 7.70.0 - -
AUR curl-git 7.56.0.55.g4440b6ad5 - falconindy@aur
AUR curl-http2-git curl.7_70_0.r28.gf7ab48857 - thegoliath@aur
AUR libcurl-openssl-1.0 7.70.0 - xuanruiqi@aur
AUR libcurl3-gnutls 7.65.0 Potentially vulnerable - fredericva@aur
AUR libx32-curl 7.46.0 Potentially vulnerable - fantix@aur
Astra Orel Stable
main
curl 7.52.1 Potentially vulnerable web ghedo@debian.org, ijackson@chiark.greenend.org.uk
Astra Orel Current
main
curl 7.52.1 Potentially vulnerable web ghedo@debian.org, ijackson@chiark.greenend.org.uk
Ataraxia Linux curl 7.70.0 net nagakamira@gmail.com
Carbs Linux
core
curl 7.70.0 - cem@ckyln.com
Carbs Linux
testing
curl 7.70.0 - cem@ckyln.com
CentOS 6
os
curl 7.19.7 Potentially vulnerable Applications/Internet -
CentOS 6
updates
curl 7.19.7 Potentially vulnerable Applications/Internet -
CentOS 7
os
curl 7.29.0 Potentially vulnerable Applications/Internet -
CentOS 8
BaseOS
curl 7.61.1 Potentially vulnerable Unspecified bugs@centos.org
Chakra
core
curl 7.68.0 - -
Chakra
core
curl-debug 7.68.0 - -
Chocolatey cURL 7.70.0 - -
ConanCenter libcurl 7.70.0 - -
ConanCenter libcurl 7.69.1 - -
ConanCenter libcurl 7.68.0 - -
ConanCenter libcurl 7.67.0 - -
ConanCenter libcurl 7.66.0 - -
ConanCenter libcurl 7.64.1 Potentially vulnerable - -
CRUX 3.2
core
curl 7.52.1 Potentially vulnerable - -
CRUX 3.3
core
curl 7.60.0 Potentially vulnerable - -
CRUX 3.4
core
curl 7.65.1 Potentially vulnerable - -
CRUX 3.5
core
curl 7.70.0 - -
Cygwin curl 7.66.0 Net yaakov.selkowitz@cygwin
Cygwin curl-debuginfo 7.66.0 Debug yaakov.selkowitz@cygwin
Cygwin libcurl-devel 7.66.0 Libs yaakov.selkowitz@cygwin
Cygwin libcurl-doc 7.66.0 Doc yaakov.selkowitz@cygwin
Cygwin libcurl4 7.66.0 Libs yaakov.selkowitz@cygwin
Debian Oldstable
oldstable/main
curl 7.52.1 Potentially vulnerable libs ghedo@debian.org, ijackson@chiark.greenend.org.uk
Debian Stable
stable/main
curl 7.64.0 Potentially vulnerable libs ghedo@debian.org, ijackson@chiark.greenend.org.uk
Debian Testing
testing/main
curl 7.68.0 libs ghedo@debian.org
Debian Unstable
main
curl 7.68.0 libs ghedo@debian.org
Deepin
main
curl 7.60.0 Potentially vulnerable web ghedo@debian.org, ijackson@chiark.greenend.org.uk
Devuan 1.0 (Jessie)
jessie/main
curl 7.38.0 Potentially vulnerable libs ghedo@debian.org, ijackson@chiark.greenend.org.uk
Devuan 2.0 (ASCII)
ascii/main
curl 7.52.1 Potentially vulnerable libs ghedo@debian.org, ijackson@chiark.greenend.org.uk
Devuan 3.0 (Beowulf)
beowulf/main
curl 7.64.0 Potentially vulnerable libs ghedo@debian.org, ijackson@chiark.greenend.org.uk
Devuan 4.0 (Chimaera)
chimaera/main
curl 7.68.0 libs ghedo@debian.org
Devuan Unstable
unstable/main
curl 7.68.0 libs ghedo@debian.org
distri curl-gnutls 7.69.1 - -
distri curl 7.69.1 - -
DistroWatch.com curl 7.70.0 - -
DPorts ftp/curl 7.70.0 ftp sunpoet@freebsd.org
Entware
aarch64-k3.10
curl 7.69.0 net kaloz@openwrt.org
Entware
aarch64-k3.10
libcurl 7.69.0 libs kaloz@openwrt.org
Entware
armv5sf-k3.2
curl 7.69.0 net kaloz@openwrt.org
Entware
armv5sf-k3.2
libcurl 7.69.0 libs kaloz@openwrt.org
Entware
armv7sf-k2.6
curl 7.69.0 net kaloz@openwrt.org
Entware
armv7sf-k2.6
libcurl 7.69.0 libs kaloz@openwrt.org
Entware
armv7sf-k3.2
curl 7.69.0 net kaloz@openwrt.org
Entware
armv7sf-k3.2
libcurl 7.69.0 libs kaloz@openwrt.org
Entware
mipselsf-k3.4
curl 7.69.0 net kaloz@openwrt.org
Entware
mipselsf-k3.4
libcurl 7.69.0 libs kaloz@openwrt.org
Entware
mipssf-k3.4
curl 7.69.0 net kaloz@openwrt.org
Entware
mipssf-k3.4
libcurl 7.69.0 libs kaloz@openwrt.org
Entware
x64-k3.2
curl 7.69.0 net kaloz@openwrt.org
Entware
x64-k3.2
libcurl 7.69.0 libs kaloz@openwrt.org
Exherbo
arbor
net-misc/curl 7.70.0 net-misc fallback-mnt-exherbo@repology
Fedora 26
release
curl 7.53.1 Potentially vulnerable Applications/Internet -
Fedora 26
updates
curl 7.53.1 Potentially vulnerable Applications/Internet -
Fedora 27
release
curl 7.55.1 Potentially vulnerable Applications/Internet -
Fedora 27
updates
curl 7.55.1 Potentially vulnerable Applications/Internet -
Fedora 28
release
curl 7.59.0 Potentially vulnerable Unspecified -
Fedora 28
updates
curl 7.59.0 Potentially vulnerable Unspecified -
Fedora 29
release
curl 7.61.1 Potentially vulnerable Unspecified -
Fedora 29
updates
curl 7.61.1 Potentially vulnerable Unspecified -
Fedora 30
updates
curl 7.65.3 Potentially vulnerable Unspecified -
Fedora 30
release
curl 7.64.0 Potentially vulnerable Unspecified -
Fedora 31
release
curl 7.66.0 Unspecified -
Fedora 32
release
curl 7.69.1 Unspecified -
Fedora 32
updates
curl 7.69.1 Unspecified -
Fedora Rawhide curl 7.70.0 Unspecified -
FreeBSD Ports ftp/curl 7.70.0 ftp sunpoet@freebsd.org
FreeBSD Ports ftp/linux-c7-curl 7.29.0 Potentially vulnerable ftp emulation@freebsd.org
freshcode.club curl 7.65.0 Potentially vulnerable - -
Funtoo 1.4
core-kit
net-misc/curl 7.65.1 Potentially vulnerable net-misc blueness@gentoo.org
Funtoo 1.4
core-kit
net-misc/curl 7.65.0 Potentially vulnerable net-misc blueness@gentoo.org
Funtoo 1.4
core-kit
net-misc/curl 7.64.1 Potentially vulnerable net-misc blueness@gentoo.org
Funtoo 1.4
core-kit
net-misc/curl 7.64.0 Potentially vulnerable net-misc blueness@gentoo.org
Gentoo net-misc/curl 7.70.0 net-misc blueness@gentoo.org
Gentoo net-misc/curl 7.69.1 net-misc blueness@gentoo.org
Gentoo net-misc/curl 7.68.0 net-misc blueness@gentoo.org
GNU Guix curl 7.69.1 - -
GoboLinux Curl 7.68.0 - -
GoboLinux LibCurl-GnuTLS 7.19.3 Potentially vulnerable - -
HaikuPorts master net-misc/curl 7.69.1 net-misc -
Homebrew curl 7.70.0 - -
Homebrew curl-openssl 7.70.0 - -
HP-UX 11.31
hppa_32
curl 7.70.0 - -
HP-UX 11.31
ia64_64
curl 7.70.0 - -
HP-UX 11.31
hppa_32
curl 7.69.1 - -
HP-UX 11.31
ia64_64
curl 7.69.1 - -
HP-UX 11.31
hppa_32
curl 7.55.0 Potentially vulnerable - -
HP-UX 11.31
ia64_32
curl 7.55.0 Potentially vulnerable - -
HP-UX 11.31
hppa_32
curl 7.34.0 Potentially vulnerable - -
Hyperbola
core
curl 7.54.0 Potentially vulnerable - -
Hyperbola
core
curl-debug 7.54.0 Potentially vulnerable - -
Hyperbola
community
libcurl-compat 7.54.0 Potentially vulnerable - -
Hyperbola
community
libcurl-gnutls 7.54.0 Potentially vulnerable - -
Kali Linux Rolling
main
curl 7.68.0 libs ghedo@debian.org
KaOS
core
curl 7.70.0 - demm@kaosx.us
KISS Linux Main
core
curl 7.70.0 - dylan.araps@gmail.com
Kwort 4.3.2 curl 7.59.0 Potentially vulnerable - -
Kwort 4.3.3 curl 7.64.1 Potentially vulnerable - -
Kwort 4.3.4 curl 7.70.0 - -
LiGurOS 20.1
core-kit
net-misc/curl 7.70.0 net-misc blueness@gentoo.org
LiGurOS 20.1
core-kit
net-misc/curl 7.69.1 net-misc blueness@gentoo.org
LiGurOS 20.1
core-kit
net-misc/curl 7.68.0 net-misc blueness@gentoo.org
LiGurOS 20.7
core-kit
net-misc/curl 7.70.0 net-misc blueness@gentoo.org
LiGurOS 20.7
core-kit
net-misc/curl 7.69.1 net-misc blueness@gentoo.org
LiGurOS 20.7
core-kit
net-misc/curl 7.68.0 net-misc blueness@gentoo.org
Linuxbrew curl 7.70.0 - -
Linuxbrew curl-openssl 7.70.0 - -
MacPorts curl 7.70.0 net ryandesign@macports, ryandesign@github
MacPorts curl-ca-bundle 7.70.0 net ryandesign@macports, ryandesign@github
Maemo Fremantle curl 7.25.0 Potentially vulnerable - luf@pzkagis.cz
Mageia 6
core/release
curl 7.54.1 Potentially vulnerable Networking/Other -
Mageia 6
core/updates
curl 7.54.1 Potentially vulnerable Networking/Other -
Mageia 6
core/updates
curl 7.54.1 Potentially vulnerable Networking/Other -
Mageia 6
core/updates
curl 7.54.1 Potentially vulnerable Networking/Other -
Mageia 6
core/updates
curl 7.54.1 Potentially vulnerable Networking/Other -
Mageia 7
core/updates
curl 7.66.0 Networking/Other -
Mageia 7
core/release
curl 7.64.1 Potentially vulnerable Networking/Other -
Mageia Cauldron
core/release
curl 7.70.0 Networking/Other -
Manjaro Stable
community
libcurl-compat 7.70.0 - -
Manjaro Stable
community
libcurl-gnutls 7.70.0 - -
Manjaro Stable
core
curl 7.70.0 - -
Manjaro Testing
community
libcurl-compat 7.70.0 - -
Manjaro Testing
community
libcurl-gnutls 7.70.0 - -
Manjaro Testing
core
curl 7.70.0 - -
Manjaro Unstable
community
libcurl-compat 7.70.0 - -
Manjaro Unstable
community
libcurl-gnutls 7.70.0 - -
Manjaro Unstable
core
curl 7.70.0 - -
MSYS2 mingw
x86_64
mingw-w64-x86_64-curl 7.70.0 - alexpux@gmail.com
MSYS2 mingw
i686
mingw-w64-i686-curl 7.70.0 - alexpux@gmail.com
MSYS2 msys2
x86_64
curl 7.70.0 base alexpux@gmail.com
MSYS2 msys2
x86_64
libcurl 7.70.0 libraries alexpux@gmail.com
MSYS2 msys2
x86_64
libcurl-devel 7.70.0 development alexpux@gmail.com
MSYS2 msys2
i686
curl 7.70.0 base alexpux@gmail.com
MSYS2 msys2
i686
libcurl 7.70.0 libraries alexpux@gmail.com
MSYS2 msys2
i686
libcurl-devel 7.70.0 development alexpux@gmail.com
nixpkgs stable curl 7.68.0 - jason@oconal.id.au
nixpkgs stable curl 7.68.0 - jason@oconal.id.au
nixpkgs unstable curl 7.69.1 - jason@oconal.id.au
nixpkgs unstable curl 7.69.1 - jason@oconal.id.au
Npackd Stable cURL 7.70 Communications -
Npackd Stable cURL 7.69.1 Communications -
Npackd Stable cURL 7.69 Communications -
Npackd Stable cURL 7.68 Communications -
Npackd Stable cURL 7.67 Communications -
Npackd Stable cURL 7.66 Communications -
Npackd Stable cURL 7.65.3 Potentially vulnerable Communications -
Npackd Stable cURL 7.65.1 Potentially vulnerable Communications -
Npackd Stable cURL 7.58 Potentially vulnerable Communications -
Npackd Stable cURL 7.55.1 Potentially vulnerable Communications -
Npackd Stable cURL 7.54 Potentially vulnerable Communications -
Npackd Stable cURL 7.48 Potentially vulnerable Communications -
Npackd Stable cURL 7.33 Potentially vulnerable Communications -
Npackd Stable cURL 7.31 Potentially vulnerable Communications -
Npackd Stable cURL 7.30 Potentially vulnerable Communications -
Npackd Stable cURL 7.29 Potentially vulnerable Communications -
Npackd Stable cURL 7.28.1 Potentially vulnerable Communications -
Npackd Stable cURL 7.27 Potentially vulnerable Communications -
Npackd Stable cURL 7.26 Potentially vulnerable Communications -
Npackd Stable cURL 7.25 Potentially vulnerable Communications -
Npackd Stable cURL 7.24 Potentially vulnerable Communications -
Npackd Stable64 cURL 64 bit 7.70 Communications -
Npackd Stable64 cURL 64 bit 7.69.1 Communications -
Npackd Stable64 cURL 64 bit 7.69 Communications -
Npackd Stable64 cURL 64 bit 7.68 Communications -
Npackd Stable64 cURL 64 bit 7.67 Communications -
Npackd Stable64 cURL 64 bit 7.66 Communications -
Npackd Stable64 cURL 64 bit 7.65.3 Potentially vulnerable Communications -
Npackd Stable64 cURL 64 bit 7.65.1 Potentially vulnerable Communications -
Npackd Stable64 cURL 64 bit 7.58 Potentially vulnerable Communications -
Npackd Stable64 cURL 64 bit 7.55.1 Potentially vulnerable Communications -
Npackd Stable64 cURL 64 bit 7.54 Potentially vulnerable Communications -
Npackd Stable64 cURL 64 bit 7.48 Potentially vulnerable Communications -
Npackd Stable64 cURL 64 bit 7.45 Potentially vulnerable Communications -
Npackd Stable64 cURL 64 bit 7.43 Potentially vulnerable Communications -
Npackd Stable64 cURL 64 bit 7.42 Potentially vulnerable Communications -
Npackd Stable64 cURL 64 bit 7.40 Potentially vulnerable Communications -
Npackd Stable64 cURL 64 bit 7.38 Potentially vulnerable Communications -
Npackd Stable64 cURL 64 bit 7.37 Potentially vulnerable Communications -
Npackd Stable64 cURL 64 bit 7.36 Potentially vulnerable Communications -
Npackd Stable64 cURL 64 bit 7.35 Potentially vulnerable Communications -
Npackd Stable64 cURL 64 bit 7.33 Potentially vulnerable Communications -
Npackd Stable64 cURL 64 bit 7.31 Potentially vulnerable Communications -
Npackd Stable64 cURL 64 bit 7.30 Potentially vulnerable Communications -
Npackd Stable64 cURL 64 bit 7.29 Potentially vulnerable Communications -
Npackd Stable64 cURL 64 bit 7.28.1 Potentially vulnerable Communications -
Npackd Stable64 cURL 64 bit 7.27 Potentially vulnerable Communications -
Npackd Unstable cURL 7.45 Potentially vulnerable Communications -
Npackd Unstable cURL 7.43 Potentially vulnerable Communications -
Npackd Unstable cURL 7.42 Potentially vulnerable Communications -
Npackd Unstable cURL 7.40 Potentially vulnerable Communications -
Npackd Unstable cURL 7.38 Potentially vulnerable Communications -
Npackd Unstable cURL 7.37 Potentially vulnerable Communications -
Npackd Unstable cURL 7.36 Potentially vulnerable Communications -
Npackd Unstable cURL 7.35 Potentially vulnerable Communications -
OpenBSD Ports net/curl 7.70.0 net naddy@openbsd.org
openEuler 20.03
source
curl 7.66.0 Unspecified -
OpenIndiana packages
hipster
curl 7.61.1 Potentially vulnerable System/Libraries -
OpenMandriva 3.0
main/updates
curl 7.63.0 Potentially vulnerable Networking/Other tpgxyz@gmail.com
OpenMandriva 3.0
main/release
curl 7.48.0 Potentially vulnerable Networking/Other bero@lindev.ch
OpenMandriva 4.0
main/release
curl 7.65.0 Potentially vulnerable Networking/Other bero@lindev.ch
OpenMandriva 4.0
main/updates
curl 7.65.0 Potentially vulnerable Networking/Other benbullard79@cox.net
OpenMandriva 4.1
main/release
curl 7.68.0 Networking/Other nobodydead@gmail.com
OpenMandriva Rolling
main/release
curl 7.69.1 Networking/Other nobodydead@gmail.com
OpenMandriva Cooker
main/release
curl 7.70.0 Networking/Other bero@lindev.ch
OpenPKG curl 7.70.0 Web -
openSUSE Leap 42.3
main/oss
curl 7.37.0 Potentially vulnerable Productivity/Networking/Web/Utilities -
openSUSE Leap 42.3
updates/oss
curl 7.37.0 Potentially vulnerable Productivity/Networking/Web/Utilities -
openSUSE Leap 42.3
updates/oss
curl 7.37.0 Potentially vulnerable Productivity/Networking/Web/Utilities -
openSUSE Leap 42.3
updates/oss
curl 7.37.0 Potentially vulnerable Productivity/Networking/Web/Utilities -
openSUSE Leap 42.3
updates/oss
curl 7.37.0 Potentially vulnerable Productivity/Networking/Web/Utilities -
openSUSE Leap 42.3
updates/oss
curl 7.37.0 Potentially vulnerable Productivity/Networking/Web/Utilities -
openSUSE Leap 42.3
updates/oss
curl 7.37.0 Potentially vulnerable Productivity/Networking/Web/Utilities -
openSUSE Leap 42.3
updates/oss
curl 7.37.0 Potentially vulnerable Productivity/Networking/Web/Utilities -
openSUSE Leap 42.3
updates/oss
curl 7.37.0 Potentially vulnerable Productivity/Networking/Web/Utilities -
openSUSE Leap 42.3
updates/oss
curl 7.37.0 Potentially vulnerable Productivity/Networking/Web/Utilities -
openSUSE Leap 42.3
updates/oss
curl 7.37.0 Potentially vulnerable Productivity/Networking/Web/Utilities -
openSUSE Leap 42.3
updates/oss
curl 7.37.0 Potentially vulnerable Productivity/Networking/Web/Utilities -
openSUSE Leap 15.0
updates/oss
curl 7.60.0 Potentially vulnerable Productivity/Networking/Web/Utilities -
openSUSE Leap 15.0
updates/oss
curl 7.60.0 Potentially vulnerable Productivity/Networking/Web/Utilities -
openSUSE Leap 15.0
updates/oss
curl 7.60.0 Potentially vulnerable Productivity/Networking/Web/Utilities -
openSUSE Leap 15.0
updates/oss
curl 7.60.0 Potentially vulnerable Productivity/Networking/Web/Utilities -
openSUSE Leap 15.0
updates/oss
curl 7.60.0 Potentially vulnerable Productivity/Networking/Web/Utilities -
openSUSE Leap 15.0
updates/oss
curl 7.60.0 Potentially vulnerable Productivity/Networking/Web/Utilities -
openSUSE Leap 15.0
updates/oss
curl 7.60.0 Potentially vulnerable Productivity/Networking/Web/Utilities -
openSUSE Leap 15.0
updates/oss
curl 7.60.0 Potentially vulnerable Productivity/Networking/Web/Utilities -
openSUSE Leap 15.0
updates/oss
curl 7.60.0 Potentially vulnerable Productivity/Networking/Web/Utilities -
openSUSE Leap 15.0
updates/oss
curl-mini 7.60.0 Potentially vulnerable Productivity/Networking/Web/Utilities -
openSUSE Leap 15.0
updates/oss
curl-mini 7.60.0 Potentially vulnerable Productivity/Networking/Web/Utilities -
openSUSE Leap 15.0
updates/oss
curl-mini 7.60.0 Potentially vulnerable Productivity/Networking/Web/Utilities -
openSUSE Leap 15.0
updates/oss
curl-mini 7.60.0 Potentially vulnerable Productivity/Networking/Web/Utilities -
openSUSE Leap 15.0
updates/oss
curl-mini 7.60.0 Potentially vulnerable Productivity/Networking/Web/Utilities -
openSUSE Leap 15.0
updates/oss
curl-mini 7.60.0 Potentially vulnerable Productivity/Networking/Web/Utilities -
openSUSE Leap 15.0
main/oss
curl 7.59.0 Potentially vulnerable Productivity/Networking/Web/Utilities -
openSUSE Leap 15.1
main/oss
curl 7.60.0 Potentially vulnerable Productivity/Networking/Web/Utilities -
openSUSE Leap 15.1
updates/oss
curl 7.60.0 Potentially vulnerable Productivity/Networking/Web/Utilities -
openSUSE Leap 15.1
updates/oss
curl 7.60.0 Potentially vulnerable Productivity/Networking/Web/Utilities -
openSUSE Leap 15.1
updates/oss
curl 7.60.0 Potentially vulnerable Productivity/Networking/Web/Utilities -
openSUSE Leap 15.1
updates/oss
curl-mini 7.60.0 Potentially vulnerable Productivity/Networking/Web/Utilities -
openSUSE Leap 15.1
updates/oss
curl-mini 7.60.0 Potentially vulnerable Productivity/Networking/Web/Utilities -
openSUSE Leap 15.1
updates/oss
curl-mini 7.60.0 Potentially vulnerable Productivity/Networking/Web/Utilities -
openSUSE Leap 15.2
main/oss
curl 7.66.0 Productivity/Networking/Web/Utilities -
openSUSE Tumbleweed curl 7.70.0 Unspecified -
OpenWrt 17.01 x86_64
base
curl 7.52.1 Potentially vulnerable net kaloz@openwrt.org
OpenWrt 17.01 x86_64
base
libcurl 7.52.1 Potentially vulnerable libs kaloz@openwrt.org
OpenWrt 18.06 x86_64
base
curl 7.60.0 Potentially vulnerable net kaloz@openwrt.org
OpenWrt 18.06 x86_64
base
libcurl 7.60.0 Potentially vulnerable libs kaloz@openwrt.org
OpenWrt 19.07 x86_64
base
curl 7.66.0 net kaloz@openwrt.org
OpenWrt 19.07 x86_64
base
libcurl4 7.66.0 libs kaloz@openwrt.org
OS4Depot libcurl 7.65.3 Potentially vulnerable development/library/misc -
OS4Depot curl 7.65.3 Potentially vulnerable network/misc -
Parabola
core
curl 7.70.0 - -
Parabola
community
libcurl-compat 7.70.0 - -
Parabola
community
libcurl-gnutls 7.70.0 - -
Pardus
main
curl 7.52.1 Potentially vulnerable libs ghedo@debian.org, ijackson@chiark.greenend.org.uk
Pardus
updates/main
curl 7.52.1 Potentially vulnerable libs ghedo@debian.org, ijackson@chiark.greenend.org.uk
Pardus
updates/main
curl 7.52.1 Potentially vulnerable libs ghedo@debian.org, ijackson@chiark.greenend.org.uk
Pardus
updates/main
curl 7.52.1 Potentially vulnerable libs ghedo@debian.org, ijackson@chiark.greenend.org.uk
Pardus
updates/main
curl 7.52.1 Potentially vulnerable libs ghedo@debian.org, ijackson@chiark.greenend.org.uk
Parrot
main
curl 7.68.0 libs ghedo@debian.org
PCLinuxOS curl 7.70.0 Networking/Other -
Pisi Linux
core
curl 7.67.0 app:console admins@pisilinux.org
Pisi Linux Contrib libcurl-gnutls 7.64.1 Potentially vulnerable app:console admins@pisilinux.org
pkgsrc current www/curl 7.70.0 www leot@netbsd.org
PLD Linux curl 7.69.1 - -
PureOS Amber curl 7.64.0 Potentially vulnerable misc ghedo@debian.org, ijackson@chiark.greenend.org.uk
PureOS landing curl 7.68.0 misc ghedo@debian.org
Raspbian Oldstable
main
curl 7.52.1 Potentially vulnerable libs ghedo@debian.org, ijackson@chiark.greenend.org.uk
Raspbian Stable
main
curl 7.64.0 Potentially vulnerable libs ghedo@debian.org, ijackson@chiark.greenend.org.uk
Raspbian Testing
main
curl 7.68.0 libs ghedo@debian.org
Ravenports curl 7.70.0 ftp fallback-mnt-ravenports@repology
Rosa 2014.1
main/updates
curl 7.52.1 Potentially vulnerable - -
Rosa 2014.1
main/release
curl 7.37.0 Potentially vulnerable - -
Rosa 2016.1
main/testing
curl 7.70.0 - -
Rosa 2016.1
main/updates
curl 7.70.0 - -
Rosa 2016.1
main/release
curl 7.52.1 Potentially vulnerable - -
Rosa 2019.1
main/release
curl 7.70.0 Networking/Other alexander@mezon.ru
Rosa Server 6.9
base/release
curl 7.19.7 Potentially vulnerable Applications/Internet andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
curl 7.19.7 Potentially vulnerable Applications/Internet andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
curl 7.19.7 Potentially vulnerable Applications/Internet andrew.lukoshko@rosalab.ru
Rosa Server 7.3
base/release
curl 7.29.0 Potentially vulnerable Applications/Internet alex2048@mail.ru
Rosa Server 7.5
base/release
curl 7.29.0 Potentially vulnerable Applications/Internet alex2048@mail.ru
Rosa Server 7.5
base/release
curl 7.29.0 Potentially vulnerable Applications/Internet alex2048@mail.ru
Scientific Linux 7.x curl 7.29.0 Potentially vulnerable Applications/Internet -
Scientific Linux 7.x curl 7.29.0 Potentially vulnerable Applications/Internet -
Scientific Linux 7.x curl 7.29.0 Potentially vulnerable Applications/Internet -
Scientific Linux 7.x curl 7.29.0 Potentially vulnerable Applications/Internet -
Scientific Linux 7.x curl 7.29.0 Potentially vulnerable Applications/Internet -
Scientific Linux 7.x curl 7.29.0 Potentially vulnerable Applications/Internet -
Scientific Linux 7.x curl 7.29.0 Potentially vulnerable Applications/Internet -
Scientific Linux 7.x curl 7.29.0 Potentially vulnerable Applications/Internet -
Scientific Linux 7.x curl 7.29.0 Potentially vulnerable Applications/Internet -
Scientific Linux 7.x curl 7.29.0 Potentially vulnerable Applications/Internet -
Scientific Linux 7.x curl 7.29.0 Potentially vulnerable Applications/Internet -
Scientific Linux 7.x curl 7.29.0 Potentially vulnerable Applications/Internet -
Scientific Linux 7.x curl 7.29.0 Potentially vulnerable Applications/Internet -
Scoop
main
curl 7.70.0 - -
Slackware 14.2
patches
curl 7.66.0 - volkerdi@slackware.com
Slackware 14.2
slackware
curl 7.49.1 Potentially vulnerable - volkerdi@slackware.com
Slackware current
slackware
curl 7.70.0 - volkerdi@slackware.com
Slackware64 14.2
patches
curl 7.66.0 - volkerdi@slackware.com
Slackware64 14.2
slackware64
curl 7.49.1 Potentially vulnerable - volkerdi@slackware.com
Slackware64 current
slackware64
curl 7.70.0 - volkerdi@slackware.com
Slackwarearm 14.2
patches
curl 7.66.0 - volkerdi@slackware.com
Slackwarearm 14.2
slackware
curl 7.49.1 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm current
slackware
curl 7.70.0 - volkerdi@slackware.com
SliTaz Cooking curl 7.68.0 network pankso@slitaz.org
SliTaz Cooking curl-dev 7.68.0 development pankso@slitaz.org
SliTaz Cooking libcurl 7.68.0 network pankso@slitaz.org
SliTaz Next curl 7.61.1 Potentially vulnerable network devel@slitaz.org
SliTaz Next libcurl 7.61.1 Potentially vulnerable network devel@slitaz.org
SliTaz Next curl-dev 7.61.1 Potentially vulnerable development devel@slitaz.org
Solus curl-32bit 7.70.0 emul32 fabio@redaril.me
Solus curl-32bit-dbginfo 7.70.0 debug fabio@redaril.me
Solus curl-32bit-devel 7.70.0 programming.devel fabio@redaril.me
Solus curl 7.70.0 system.base fabio@redaril.me
Solus curl-dbginfo 7.70.0 debug fabio@redaril.me
Solus curl-devel 7.70.0 programming.devel fabio@redaril.me
Solus curl-gnutls-32bit 7.70.0 emul32 pyu@riseup.net
Solus curl-gnutls-32bit-dbginfo 7.70.0 debug pyu@riseup.net
Solus curl-gnutls 7.70.0 binary.compat pyu@riseup.net
Solus curl-gnutls-dbginfo 7.70.0 debug pyu@riseup.net
T2 SDE curl 7.70.0 base/tool rene@t2-project.org
Termux libcurl 7.70.0 - termux@termux
Trisquel 6.0
toutatis/main
curl 7.22.0 Potentially vulnerable web ubuntu-devel-discuss@lists.ubuntu.com, al3xbio@gmail.com, ijackson@chiark.greenend.org.uk, luk@debian.org
Trisquel 6.0
toutatis-updates/main
curl 7.22.0 Potentially vulnerable web ubuntu-devel-discuss@lists.ubuntu.com, al3xbio@gmail.com, ijackson@chiark.greenend.org.uk, luk@debian.org
Trisquel 7.0
belenos/main
curl 7.35.0 Potentially vulnerable web ubuntu-devel-discuss@lists.ubuntu.com, ijackson@chiark.greenend.org.uk
Trisquel 7.0
belenos-updates/main
curl 7.35.0 Potentially vulnerable web ubuntu-devel-discuss@lists.ubuntu.com, ijackson@chiark.greenend.org.uk
Trisquel 8.0
flidas/main
curl 7.47.0 Potentially vulnerable web ubuntu-devel-discuss@lists.ubuntu.com, ijackson@chiark.greenend.org.uk
Trisquel 8.0
flidas-updates/main
curl 7.47.0 Potentially vulnerable web ubuntu-devel-discuss@lists.ubuntu.com, ijackson@chiark.greenend.org.uk
Ubuntu 12.04
precise/main
curl 7.22.0 Potentially vulnerable web ubuntu-devel-discuss@lists.ubuntu.com, al3xbio@gmail.com, ijackson@chiark.greenend.org.uk, luk@debian.org
Ubuntu 12.04
precise-updates/main
curl 7.22.0 Potentially vulnerable web ubuntu-devel-discuss@lists.ubuntu.com, al3xbio@gmail.com, ijackson@chiark.greenend.org.uk, luk@debian.org
Ubuntu 14.04
trusty/main
curl 7.35.0 Potentially vulnerable web ubuntu-devel-discuss@lists.ubuntu.com, ijackson@chiark.greenend.org.uk
Ubuntu 14.04
trusty-updates/main
curl 7.35.0 Potentially vulnerable web ubuntu-devel-discuss@lists.ubuntu.com, ijackson@chiark.greenend.org.uk
Ubuntu 16.04
xenial/main
curl 7.47.0 Potentially vulnerable web ubuntu-devel-discuss@lists.ubuntu.com, ijackson@chiark.greenend.org.uk
Ubuntu 16.04
xenial-updates/main
curl 7.47.0 Potentially vulnerable web ubuntu-devel-discuss@lists.ubuntu.com, ijackson@chiark.greenend.org.uk
Ubuntu 18.04
bionic/main
curl 7.58.0 Potentially vulnerable web ubuntu-devel-discuss@lists.ubuntu.com, ijackson@chiark.greenend.org.uk
Ubuntu 18.04
bionic/universe
curl3 7.58.0 Potentially vulnerable universe/web ubuntu-devel-discuss@lists.ubuntu.com, ijackson@chiark.greenend.org.uk
Ubuntu 18.04
bionic-updates/main
curl 7.58.0 Potentially vulnerable web ubuntu-devel-discuss@lists.ubuntu.com, ijackson@chiark.greenend.org.uk
Ubuntu 19.10
eoan/main
curl 7.65.3 Potentially vulnerable web ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 20.04
focal/main
curl 7.68.0 web ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 20.10
groovy/main
curl 7.68.0 web ubuntu-devel-discuss@lists.ubuntu.com
UnitedRPMs Fedora 30
release
curl-openssl 7.43.0 Potentially vulnerable Applications/Internet -
UnitedRPMs Fedora 31
release
curl-openssl 7.43.0 Potentially vulnerable Applications/Internet -
UnitedRPMs Fedora 32
release
curl-openssl 7.43.0 Potentially vulnerable Applications/Internet -
UnitedRPMs Fedora 33
release
curl-openssl 7.43.0 Potentially vulnerable Applications/Internet -
Vcpkg curl 7.68.0 - -
Void Linux x86_64
x86_64
curl 7.70.0 - xtraeme@gmail.com
Void Linux x86_64
x86_64
libcurl 7.70.0 - xtraeme@gmail.com
Void Linux x86_64
x86_64
libcurl-devel 7.70.0 - xtraeme@gmail.com
Wikidata cURL 7.70.0 - -
Wikidata libcurl 7.70.0 - -

Absent in repositories

  • antiX-16
  • antiX-17
  • Arch Testing
  • BlackArch
  • BlackBox 6
  • BlackBox 7
  • Buckaroo
  • BunsenLabs Hydrogen
  • BunsenLabs Hydrogen/Jessie Backports
  • BunsenLabs Helium
  • BunsenLabs Helium/Stretch Backports
  • Calculate
  • Chakra Staging
  • Chakra Testing
  • CPAN
  • MetaCPAN
  • CRAN
  • crates.io
  • Deb Multimedia Unstable
  • Debian Stable Backports
  • Debian Experimental
  • ELRepo el7
  • ELRepo el7 Testing
  • EPEL 6
  • EPEL 7
  • EPEL 8
  • F-Droid
  • Gentoo overlay GURU
  • Gentoo overlay Pentoo
  • GNU Elpa
  • Hackage
  • Homebrew Casks
  • Homebrew tap Brewsci/bio
  • just-install
  • KaOS Build
  • KDE neon Dev Stable
  • KDE neon Dev Unstable
  • KDE neon Experimental
  • KDE neon User
  • KDE neon User LTS
  • KISS Linux Community
  • Libregamewiki
  • Linux Mint 17
  • Linux Mint 17.1
  • Linux Mint 17.2
  • Linux Mint 17.3
  • Linux Mint 18
  • Linux Mint 18.1
  • Linux Mint 18.2
  • Linux Mint 18.3
  • Linux Mint 19
  • Linux Mint 19.1
  • Linux Mint 19.2
  • Linux Mint 19.3
  • LuaRocks
  • MELPA
  • MX Linux MX-15
  • MX Linux MX-15 Testing
  • MX Linux MX-16
  • MX Linux MX-17
  • MX Linux MX-17 Testing
  • MX Linux MX-19
  • MX Linux MX-19 Testing
  • NeuroDebian data
  • NeuroDebian Debian 8
  • NeuroDebian Debian 9
  • NeuroDebian Debian 10
  • NeuroDebian Debian Unstable
  • NeuroDebian Ubuntu 14.04
  • NeuroDebian Ubuntu 16.04
  • NeuroDebian Ubuntu 18.04
  • NeuroDebian Ubuntu 19.04
  • openSUSE Education Tumbleweed
  • openSUSE Emulators Tumbleweed
  • openSUSE Games Tumbleweed
  • openSUSE Graphics Tumbleweed
  • openSUSE Hardware:SDR Tumbleweed
  • openSUSE Multimedia:Apps Tumbleweed
  • openSUSE Multimedia:Libs Tumbleweed
  • openSUSE Network Tumbleweed
  • openSUSE Science Tumbleweed
  • openSUSE Security Tumbleweed
  • PackMan openSUSE Leap 42.3
  • PackMan openSUSE Leap 15.0
  • PackMan openSUSE Leap 15.1
  • PackMan openSUSE Leap 15.2
  • PackMan openSUSE Tumbleweed
  • PackMan SLE 12
  • PackMan SLE 15
  • Parabola Testing
  • ReactOS rapps
  • RPM Fusion EL 6
  • RPM Fusion EL 7
  • RPM Fusion EL 8
  • RPM Fusion Fedora 28
  • RPM Fusion Fedora 29
  • RPM Fusion Fedora 30
  • RPM Fusion Fedora 31
  • RPM Fusion Fedora Rawhide
  • RPM Sphere
  • RubyGems
  • Sabayon
  • Sabayon for-gentoo
  • Salix 14.2
  • Siduction
  • Siduction Experimental
  • SlackBuilds
  • Sparky Stable
  • Sparky Testing
  • Stackage LTS Haskell
  • Stackage Nightly
  • Tails stable
  • Tails devel
  • Trisquel 6.0 backports
  • Trisquel 7.0 backports
  • Trisquel 8.0 backports
  • Ubuntu 12.04 Backports
  • Ubuntu 14.04 Backports
  • Ubuntu 16.04 Backports
  • Ubuntu 18.04 Backports
  • Ubuntu 19.10 Backports
  • Ubuntu 19.10 Proposed
  • Ubuntu 20.04 Proposed
  • Ubuntu 20.10 Proposed
  • Whonix
  • Whonix Developers
  • winget
  • YACP