Versions Packages Information History CVEs Related Badges Report

Versions for keepass

156 package(s) known

Repository Package name Version Category Maintainer(s)
ALT Linux p9 keepass 2.45 Potentially vulnerable File tools mcpain@altlinux.org
ALT Linux p10 keepass 2.48.1 Potentially vulnerable File tools mcpain@altlinux.org
ALT Sisyphus keepass 2.53 Potentially vulnerable File tools mcpain@altlinux.org
AOSC keepass 2.46 Potentially vulnerable admin fallback-mnt-aosc@repology
AppGet KeePass 2.45.0 Potentially vulnerable - -
Arch
community
keepass 2.51 Potentially vulnerable - -
Arch Linux 32 i486
community
keepass 2.51 Potentially vulnerable - -
Arch Linux 32 i686
community
keepass 2.51 Potentially vulnerable - -
Arch Linux 32 pentium4
community
keepass 2.51 Potentially vulnerable - -
Arch Linux ARM aarch64
community
keepass 2.51 Potentially vulnerable - -
Arch Linux ARM armv7h
community
keepass 2.51 Potentially vulnerable - -
Chocolatey Keepass 2.x 2.53.1 - -
Chocolatey Keepass 2.x (Install) 2.53.1 - -
Chocolatey Keepass 2.x (Portable) 2.53.1 - -
Debian 9
stretch/main
keepass2 2.35 Potentially vulnerable utils pkg-cli-apps-team@lists.alioth.debian.org, jtaylor.debian@googlemail.com
Debian 10
buster/main
keepass2 2.41 Potentially vulnerable utils pkg-cli-apps-team@lists.alioth.debian.org, jtaylor.debian@googlemail.com
Debian 11
bullseye/main
keepass2 2.47 Potentially vulnerable utils pkg-cli-apps-team@lists.alioth.debian.org, jtaylor.debian@googlemail.com
Debian 12
bookworm/main
keepass2 2.47 Potentially vulnerable utils pkg-cli-apps-team@lists.alioth.debian.org, jtaylor.debian@googlemail.com
Debian Unstable
sid/main
keepass2 2.47 Potentially vulnerable utils pkg-cli-apps-team@lists.alioth.debian.org, jtaylor.debian@googlemail.com
Deepin
main
keepass2 2.41 Potentially vulnerable - pkg-cli-apps-team@lists.alioth.debian.org, jtaylor.debian@googlemail.com
Devuan 1.0
jessie/main
keepass2 2.28 Potentially vulnerable utils pkg-cli-apps-team@lists.alioth.debian.org, jtaylor.debian@googlemail.com
Devuan 2.0
ascii/main
keepass2 2.35 Potentially vulnerable utils pkg-cli-apps-team@lists.alioth.debian.org, jtaylor.debian@googlemail.com
Devuan 3.0
beowulf/main
keepass2 2.41 Potentially vulnerable utils pkg-cli-apps-team@lists.alioth.debian.org, jtaylor.debian@googlemail.com
Devuan 4.0
chimaera/main
keepass2 2.47 Potentially vulnerable utils pkg-cli-apps-team@lists.alioth.debian.org, jtaylor.debian@googlemail.com
Devuan Unstable
unstable/main
keepass2 2.47 Potentially vulnerable utils pkg-cli-apps-team@lists.alioth.debian.org, jtaylor.debian@googlemail.com
DPorts security/keepass 2.51.1 Potentially vulnerable security m.muenz@gmail.com
EPEL 7 keepass 2.42.1 Potentially vulnerable Unspecified -
EPEL 8 keepass 2.45 Potentially vulnerable Unspecified -
Fedora 26
release
keepass 2.35 Potentially vulnerable Unspecified -
Fedora 27
release
keepass 2.36 Potentially vulnerable Unspecified -
Fedora 28
release
keepass 2.38 Potentially vulnerable Unspecified -
Fedora 29
release
keepass 2.40 Potentially vulnerable Unspecified -
Fedora 30
updates
keepass 2.41 Potentially vulnerable Unspecified -
Fedora 30
release
keepass 2.41 Potentially vulnerable Unspecified -
Fedora 31
release
keepass 2.42.1 Potentially vulnerable Unspecified -
Fedora 32
release
keepass 2.44 Potentially vulnerable Unspecified -
Fedora 33
release
keepass 2.46 Potentially vulnerable Unspecified -
Fedora 34
release
keepass 2.47 Potentially vulnerable Unspecified -
Fedora 35
release
keepass 2.48.1 Potentially vulnerable Unspecified -
FreeBSD Ports security/keepass 2.52 Potentially vulnerable security m.muenz@gmail.com
Gentoo app-admin/keepass 2.49 Potentially vulnerable app-admin kensington@gentoo.org
just-install keepass 2.49 Potentially vulnerable - -
Kali Linux Rolling
main
keepass2 2.47 Potentially vulnerable utils pkg-cli-apps-team@lists.alioth.debian.org, jtaylor.debian@googlemail.com
LiGurOS stable app-admin/keepass 2.49 Potentially vulnerable app-admin kensington@gentoo.org
LiGurOS develop app-admin/keepass 2.49 Potentially vulnerable app-admin kensington@gentoo.org
Mageia 7
core/release
keepass 2.42.1 Potentially vulnerable File tools -
Mageia 8
core/updates
keepass 2.53 Potentially vulnerable File tools -
Mageia 8
core/release
keepass 2.45 Potentially vulnerable File tools -
Mageia Cauldron
core/release
keepass 2.53.1 File tools -
Manjaro Stable
community
keepass 2.51 Potentially vulnerable - -
Manjaro Testing
community
keepass 2.51 Potentially vulnerable - -
Manjaro Unstable
community
keepass 2.51 Potentially vulnerable - -
MidnightBSD mports security/keepass 2.46 Potentially vulnerable security -
MX Linux MX-19 Testing
test
keepass2 2.46 Potentially vulnerable utils stevep@mxlinux.org, jtaylor.debian@googlemail.com
nixpkgs stable 21.11 keepass 2.48.1 Potentially vulnerable - andrew.morsillo@gmail.com, obadz-nixos@obadz.com
nixpkgs stable 22.05 keepass 2.49 Potentially vulnerable - andrew.morsillo@gmail.com, obadz-nixos@obadz.com
nixpkgs stable 22.11 keepass 2.49 Potentially vulnerable - andrew.morsillo@gmail.com, obadz-nixos@obadz.com
nixpkgs unstable keepass 2.53.1 - andrew.morsillo@gmail.com, obadz-nixos@obadz.com
Npackd Stable KeePass Professional Edition 2.53.1 Security -
Npackd Stable KeePass Professional Edition 2.53 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.52 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.51.1 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.51 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.50 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.49 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.48.1 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.48 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.47 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.46 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.45 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.44 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.43 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.42.1 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.41 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.40 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.39.1 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.39 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.38 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.37 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.36 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.35 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.34 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.32 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.31 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.30 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.29 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.28 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.27 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.25 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.24.0 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.23.0 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.22.0 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.21.0 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.20.1 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.19 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.18 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.17 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.16 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.15 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.14 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.13 Potentially vulnerable Security -
Npackd Stable KeePass Professional Edition 2.12 Potentially vulnerable Security -
openSUSE Leap 42.3
main/oss
keepass 2.36 Potentially vulnerable Productivity/Other -
openSUSE Leap 15.0
main/oss
keepass 2.38 Potentially vulnerable Productivity/Other -
openSUSE Leap 15.1
main/oss
keepass 2.38 Potentially vulnerable Productivity/Other -
openSUSE Leap 15.2
main/oss
keepass 2.38 Potentially vulnerable Productivity/Other -
openSUSE Leap 15.3
main/oss
keepass 2.47 Potentially vulnerable Productivity/Other -
openSUSE Leap 15.4
main/oss
keepass 2.49 Potentially vulnerable Productivity/Other -
openSUSE Leap 15.5
main/oss
keepass 2.53.1 Productivity/Other -
openSUSE Tumbleweed
src-oss
keepass 2.53.1 Productivity/Other -
Parabola
community
keepass 2.51 Potentially vulnerable - -
Pardus 17
main
keepass2 2.35 Potentially vulnerable utils pkg-cli-apps-team@lists.alioth.debian.org, jtaylor.debian@googlemail.com
Pardus 19
main
keepass2 2.41 Potentially vulnerable utils pkg-cli-apps-team@lists.alioth.debian.org, jtaylor.debian@googlemail.com
Pardus 21
main
keepass2 2.47 Potentially vulnerable utils pkg-cli-apps-team@lists.alioth.debian.org, jtaylor.debian@googlemail.com
Parrot
parrot/main
keepass2 2.47 Potentially vulnerable utils pkg-cli-apps-team@lists.alioth.debian.org, jtaylor.debian@googlemail.com
Parrot
parrot-updates/main
keepass2 2.47 Potentially vulnerable utils pkg-cli-apps-team@lists.alioth.debian.org, jtaylor.debian@googlemail.com
pkgsrc current security/KeePass 2.44 Potentially vulnerable security pkgsrc-users@netbsd.org
PureOS Amber keepass2 2.41 Potentially vulnerable misc pkg-cli-apps-team@lists.alioth.debian.org, jtaylor.debian@googlemail.com
PureOS landing keepass2 2.47 Potentially vulnerable misc pkg-cli-apps-team@lists.alioth.debian.org, jtaylor.debian@googlemail.com
Raspbian Oldstable
main
keepass2 2.41 Potentially vulnerable utils pkg-cli-apps-team@lists.alioth.debian.org, jtaylor.debian@googlemail.com
Raspbian Stable
main
keepass2 2.47 Potentially vulnerable utils pkg-cli-apps-team@lists.alioth.debian.org, jtaylor.debian@googlemail.com
Raspbian Testing
main
keepass2 2.47 Potentially vulnerable utils pkg-cli-apps-team@lists.alioth.debian.org, jtaylor.debian@googlemail.com
Rosa 2014.1
contrib/updates
keepass 2.34 Potentially vulnerable - -
Rosa 2016.1
contrib/updates
keepass 2.43 Potentially vulnerable - -
Rosa 2016.1
contrib/release
keepass 2.34 Potentially vulnerable - -
Rosa 2021.1
contrib/release
keepass 2.52 Potentially vulnerable File tools alexander@mezon.ru
Scoop
extras
keepass 2.53.1 - -
SlackBuilds misc/KeePass 2.47 Potentially vulnerable misc -
Trisquel 6.0
toutatis/main
keepass2 2.18 Potentially vulnerable universe/utils pkg-cli-apps-team@lists.alioth.debian.org, jtaylor.debian@googlemail.com
Trisquel 7.0
belenos-updates/main
keepass2 2.25 Potentially vulnerable universe/utils pkg-cli-apps-team@lists.alioth.debian.org, jtaylor.debian@googlemail.com
Trisquel 7.0
belenos/main
keepass2 2.25 Potentially vulnerable universe/utils pkg-cli-apps-team@lists.alioth.debian.org, jtaylor.debian@googlemail.com
Trisquel 8.0
flidas/main
keepass2 2.32 Potentially vulnerable universe/utils pkg-cli-apps-team@lists.alioth.debian.org, jtaylor.debian@googlemail.com
Trisquel 9.0
etiona/main
keepass2 2.38 Potentially vulnerable universe/utils pkg-cli-apps-team@lists.alioth.debian.org, jtaylor.debian@googlemail.com
Trisquel 10.0
nabia/main
keepass2 2.44 Potentially vulnerable universe/utils pkg-cli-apps-team@lists.alioth.debian.org, jtaylor.debian@googlemail.com
Trisquel 11.0
aramo/main
keepass2 2.47 Potentially vulnerable universe/utils pkg-cli-apps-team@lists.alioth.debian.org, jtaylor.debian@googlemail.com
Ubuntu 14.04
trusty-updates/universe
keepass2 2.25 Potentially vulnerable universe/utils pkg-cli-apps-team@lists.alioth.debian.org, jtaylor.debian@googlemail.com
Ubuntu 14.04
trusty/universe
keepass2 2.25 Potentially vulnerable universe/utils pkg-cli-apps-team@lists.alioth.debian.org, jtaylor.debian@googlemail.com
Ubuntu 16.04
xenial/universe
keepass2 2.32 Potentially vulnerable universe/utils pkg-cli-apps-team@lists.alioth.debian.org, jtaylor.debian@googlemail.com
Ubuntu 18.04
bionic/universe
keepass2 2.38 Potentially vulnerable universe/utils pkg-cli-apps-team@lists.alioth.debian.org, jtaylor.debian@googlemail.com
Ubuntu 20.04
focal/universe
keepass2 2.44 Potentially vulnerable universe/utils pkg-cli-apps-team@lists.alioth.debian.org, jtaylor.debian@googlemail.com
Ubuntu 22.04
jammy/universe
keepass2 2.47 Potentially vulnerable universe/utils pkg-cli-apps-team@lists.alioth.debian.org, jtaylor.debian@googlemail.com
Ubuntu 22.10
kinetic/universe
keepass2 2.47 Potentially vulnerable universe/utils pkg-cli-apps-team@lists.alioth.debian.org, jtaylor.debian@googlemail.com
Ubuntu 23.04
lunar/universe
keepass2 2.47 Potentially vulnerable universe/utils pkg-cli-apps-team@lists.alioth.debian.org, jtaylor.debian@googlemail.com
Wikidata KeePass 2.53.1 - -
winget KeePass 2.53.1 credentials -
winget KeePass 2.53.0 Potentially vulnerable credentials -
winget KeePass 2.52.0 Potentially vulnerable credentials -
winget KeePass 2.51.1 Potentially vulnerable credentials -
winget KeePass 2.50.0 Potentially vulnerable credentials -
winget KeePass 2.49.0 Potentially vulnerable password -
winget KeePass 2.48.1 Potentially vulnerable password -
winget KeePass 2.48.0 Potentially vulnerable password -
winget KeePass 2.47.0.0 Potentially vulnerable password -
winget KeePass 2.46.0.0 Potentially vulnerable credentials -
winget KeePass 2.45.0.0 Potentially vulnerable credentials -
winget KeePass 2.44.0.0 Potentially vulnerable credentials -