Versions Packages Information History CVEs Related Badges Report

Packages for mutt

296 package(s) known

mutt

2.2.10 Potentially vulnerable (2.2.10-r0)

mutt-dbg

2.2.10 Potentially vulnerable (2.2.10-r0)

mutt-doc

2.2.10 Potentially vulnerable (2.2.10-r0)

mutt-lang

2.2.10 Potentially vulnerable (2.2.10-r0)

mutt

2.1.3 Potentially vulnerable (2.1.3-1)
AlmaLinux 8
AppStream

mutt

2.0.7 Potentially vulnerable (5:2.0.7-2.el8)
AlmaLinux 9
AppStream

mutt

2.2.6 Potentially vulnerable (5:2.2.6-1.el9)

mutt

1.10.1 Potentially vulnerable (1.10.1-r0)

mutt-doc

1.10.1 Potentially vulnerable (1.10.1-r0)

mutt-lang

1.10.1 Potentially vulnerable (1.10.1-r0)

mutt

1.11.2 Potentially vulnerable (1.11.2-r0)

mutt-doc

1.11.2 Potentially vulnerable (1.11.2-r0)

mutt-lang

1.11.2 Potentially vulnerable (1.11.2-r0)

mutt

1.12.1 Potentially vulnerable (1.12.1-r0)

mutt-doc

1.12.1 Potentially vulnerable (1.12.1-r0)

mutt-lang

1.12.1 Potentially vulnerable (1.12.1-r0)

mutt

1.13.1 Potentially vulnerable (1.13.1-r0)

mutt-doc

1.13.1 Potentially vulnerable (1.13.1-r0)

mutt-lang

1.13.1 Potentially vulnerable (1.13.1-r0)

mutt

1.14.7 Potentially vulnerable (1.14.7-r0)

mutt-doc

1.14.7 Potentially vulnerable (1.14.7-r0)

mutt-lang

1.14.7 Potentially vulnerable (1.14.7-r0)

mutt

2.0.7 Potentially vulnerable (2.0.7-r0)

mutt-doc

2.0.7 Potentially vulnerable (2.0.7-r0)

mutt-lang

2.0.7 Potentially vulnerable (2.0.7-r0)

mutt

2.1.0 Potentially vulnerable (2.1.0-r0)

mutt-doc

2.1.0 Potentially vulnerable (2.1.0-r0)

mutt-lang

2.1.0 Potentially vulnerable (2.1.0-r0)

mutt

2.2.3 Potentially vulnerable (2.2.3-r0)

mutt-doc

2.2.3 Potentially vulnerable (2.2.3-r0)

mutt-lang

2.2.3 Potentially vulnerable (2.2.3-r0)

mutt

2.2.5 Potentially vulnerable (2.2.5-r1)

mutt-doc

2.2.5 Potentially vulnerable (2.2.5-r1)

mutt-lang

2.2.5 Potentially vulnerable (2.2.5-r1)

mutt

2.2.12 (2.2.12-r0)

mutt-doc

2.2.12 (2.2.12-r0)

mutt-lang

2.2.12 (2.2.12-r0)

mutt

2.2.12 (2.2.12-r0)

mutt-doc

2.2.12 (2.2.12-r0)

mutt-lang

2.2.12 (2.2.12-r0)

mutt

2.2.12 (2.2.12-r0)

mutt-doc

2.2.12 (2.2.12-r0)

mutt-lang

2.2.12 (2.2.12-r0)

mutt

1.10.1 Potentially vulnerable (3:1.10.1-alt2.p9.1)

mutt

2.1.1.0.3.g6c0f75cca Potentially vulnerable (3:2.1.1.0.3.g6c0f75cca-alt1)

mutt

2.1.1.0.3.g6c0f75cca Potentially vulnerable (3:2.1.1.0.3.g6c0f75cca-alt1)

mutt

1.5.20 Potentially vulnerable (5:1.5.20-7.20091214hg736b6a.8.amzn1)
  • Summary:
    A text mode mail user agent
  • Category:
    • Applications/Internet
  • License:
    • GPLv2+ and Public Domain
  • Link(s):

mutt

1.5.20 Potentially vulnerable (5:1.5.20-7.20091214hg736b6a.11.amzn1)
  • Summary:
    A text mode mail user agent
  • Category:
    • Applications/Internet
  • License:
    • GPLv2+ and Public Domain
  • Link(s):

mutt

1.5.20 Potentially vulnerable (5:1.5.20-7.20091214hg736b6a.10.amzn1)
  • Summary:
    A text mode mail user agent
  • Category:
    • Applications/Internet
  • License:
    • GPLv2+ and Public Domain
  • Link(s):

mutt

1.5.21 Potentially vulnerable (5:1.5.21-27.amzn2)
  • Summary:
    A text mode mail user agent
  • Category:
    • Applications/Internet
  • License:
    • GPLv2+ and Public Domain
  • Link(s):

mutt

1.5.21 Potentially vulnerable (5:1.5.21-28.amzn2)
  • Summary:
    A text mode mail user agent
  • Category:
    • Applications/Internet
  • License:
    • GPLv2+ and Public Domain
  • Link(s):

mutt

1.5.21 Potentially vulnerable (5:1.5.21-29.amzn2.0.1)
  • Summary:
    A text mode mail user agent
  • Category:
    • Applications/Internet
  • License:
    • GPLv2+ and Public Domain
  • Link(s):

mutt

1.5.21 Potentially vulnerable (5:1.5.21-29.amzn2.0.2)
  • Summary:
    A text mode mail user agent
  • Category:
    • Applications/Internet
  • License:
    • GPLv2+ and Public Domain
  • Link(s):

mutt

2.2.0 Potentially vulnerable (2.2.0-1.0antix1)

mutt

2.2.11 Potentially vulnerable (2.2.11-1.0antix1)

mutt

2.2.11 Potentially vulnerable (2.2.11-1.0antix1)
Arch
extra

mutt

2.2.12 (2.2.12-1)

mutt

2.2.9 Potentially vulnerable (2.2.9-1.5)

mutt

2.2.9 Potentially vulnerable (2.2.9-1.5)

mutt

2.2.9 Potentially vulnerable (2.2.9-1.5)

mutt

2.2.12 (2.2.12-1)

mutt-git

2.2.10.r62.g5347d1c5 (1:2.2.10.r62.g5347d1c5-1)

mutt-kiss

2.2.10 Potentially vulnerable (2.2.10-1)

mutt-slang

2.2.11 Potentially vulnerable (2.2.11-1)
Artix
world

mutt

2.2.12 (2.2.12-1)

mutt

2.1.0 Potentially vulnerable

mutt

1.5.20 Potentially vulnerable (5:1.5.20-8.20091214hg736b6a.el6)
  • Summary:
    A text mode mail user agent
  • Category:
    • Applications/Internet
  • License:
    • GPLv2+ and Public Domain
  • Link(s):
CentOS 6
updates

mutt

1.5.20 Potentially vulnerable (5:1.5.20-9.20091214hg736b6a.el6)
  • Summary:
    A text mode mail user agent
  • Category:
    • Applications/Internet
  • License:
    • GPLv2+ and Public Domain
  • Link(s):

mutt

1.5.21 Potentially vulnerable (5:1.5.21-29.el7)
CentOS 8
AppStream

mutt

2.0.7 Potentially vulnerable (5:2.0.7-1.el8)
CentOS Stream 8
AppStream

mutt

2.0.7 Potentially vulnerable (5:2.0.7-1.el8)
CentOS Stream 8
AppStream

mutt

2.0.7 Potentially vulnerable (5:2.0.7-2.el8)
CentOS Stream 8
AppStream

mutt

2.0.6 Potentially vulnerable (5:2.0.6-1.el8)
CentOS Stream 8
AppStream

mutt

1.10.1 Potentially vulnerable (5:1.10.1-2.el8)
CentOS Stream 9
AppStream

mutt

2.2.6 Potentially vulnerable (5:2.2.6-1.el9)
CentOS Stream 9
AppStream

mutt

2.1.5 Potentially vulnerable (5:2.1.5-1.el9)
CentOS Stream 9
AppStream

mutt

2.0.6 Potentially vulnerable (5:2.0.6-3.el9)

mutt

1.12.1 Potentially vulnerable

mutt

2.0.3 Potentially vulnerable

mutt

2.2.7 Potentially vulnerable

mutt

2.2.12

mutt

2.2.12 (2.2.12-1)

mutt-debuginfo

2.2.12 (2.2.12-1)
Deepin
main

mutt

1.10.1.1 Potentially vulnerable (1.10.1.1-0.1+dde)
Devuan 3.0
beowulf/main

mutt

1.10.1 Potentially vulnerable (1.10.1-2.1+deb10u6)
Devuan 4.0
chimaera/main

mutt

2.0.5 Potentially vulnerable (2.0.5-4.1+deb11u3)
Devuan Unstable
unstable/main

mutt

2.2.12 (2.2.12-0.1)

mutt

2.2.12
Entware
armv7sf-k3.2

mutt

2.1.5 Potentially vulnerable (2.1.5-2)
Entware
mipselsf-k3.4

mutt

2.1.5 Potentially vulnerable (2.1.5-2)
Entware
mipssf-k3.4

mutt

2.1.5 Potentially vulnerable (2.1.5-2)
Entware
x64-k3.2

mutt

2.1.5 Potentially vulnerable (2.1.5-2)
Entware
aarch64-k3.10

mutt

2.1.5 Potentially vulnerable (2.1.5-2)
Entware
armv5sf-k3.2

mutt

2.1.5 Potentially vulnerable (2.1.5-2)
Entware
armv7sf-k2.6

mutt

2.1.5 Potentially vulnerable (2.1.5-2)
EuroLinux 8
appstream

mutt

2.0.7 Potentially vulnerable (5:2.0.7-1.el8)
  • Summary:
    A text mode mail user agent
  • Category:
    • Applications/Internet
  • License:
    • GPLv2+ and Public Domain
  • Link(s):
EuroLinux 8
appstream

mutt

1.10.1 Potentially vulnerable (5:1.10.1-1.el8)
  • Summary:
    A text mode mail user agent
  • Category:
    • Applications/Internet
  • License:
    • GPLv2+ and Public Domain
  • Link(s):
EuroLinux 8
appstream

mutt

1.10.1 Potentially vulnerable (5:1.10.1-2.el8)
  • Summary:
    A text mode mail user agent
  • Category:
    • Applications/Internet
  • License:
    • GPLv2+ and Public Domain
  • Link(s):
EuroLinux 9
appstream

mutt

2.2.6 Potentially vulnerable (5:2.2.6-1.el9)
EuroLinux 9
appstream

mutt

2.1.5 Potentially vulnerable (5:2.1.5-1.el9)

mutt

2.1.5 Potentially vulnerable (5:2.1.5-1.el9)
EuroLinux 9
appstream

mutt

2.0.6 Potentially vulnerable (5:2.0.6-3.el9)
Exherbo
arbor

mail-client/mutt

2.2.12
Fedora 26
updates

mutt

1.9.1 Potentially vulnerable (5:1.9.1-1.fc26)
Fedora 26
release

mutt

1.8.2 Potentially vulnerable (5:1.8.2-1.fc26)
Fedora 27
updates

mutt

1.9.2 Potentially vulnerable (5:1.9.2-2.fc27)
Fedora 27
release

mutt

1.9.1 Potentially vulnerable (5:1.9.1-1.fc27)
Fedora 28
updates

mutt

1.11.3 Potentially vulnerable (5:1.11.3-2.fc28)
Fedora 28
release

mutt

1.9.3 Potentially vulnerable (5:1.9.3-1.fc28)
Fedora 29
updates

mutt

1.12.1 Potentially vulnerable (5:1.12.1-3.fc29)
Fedora 29
release

mutt

1.10.1 Potentially vulnerable (5:1.10.1-1.fc29)
Fedora 30
updates

mutt

1.13.3 Potentially vulnerable (5:1.13.3-1.fc30)
Fedora 30
release

mutt

1.11.4 Potentially vulnerable (5:1.11.4-1.fc30)
Fedora 31
updates

mutt

1.14.6 Potentially vulnerable (5:1.14.6-1.fc31)
Fedora 31
release

mutt

1.12.1 Potentially vulnerable (5:1.12.1-3.fc31)
Fedora 32
updates

mutt

2.0.5 Potentially vulnerable (5:2.0.5-1.fc32)
Fedora 32
release

mutt

1.13.4 Potentially vulnerable (5:1.13.4-1.fc32)
Fedora 33
updates

mutt

2.0.5 Potentially vulnerable (5:2.0.5-1.fc33)
Fedora 33
release

mutt

1.14.6 Potentially vulnerable (5:1.14.6-2.fc33)
Fedora 34
updates

mutt

2.0.7 Potentially vulnerable (5:2.0.7-2.fc34)
Fedora 34
release

mutt

2.0.6 Potentially vulnerable (5:2.0.6-1.fc34)
Fedora 35
updates

mutt

2.1.5 Potentially vulnerable (5:2.1.5-1.fc35)
Fedora 35
release

mutt

2.1.1 Potentially vulnerable (5:2.1.1-1.fc35)
Fedora 36
updates

mutt

2.2.7 Potentially vulnerable (5:2.2.7-1.fc36)
Fedora 36
release

mutt

2.2.1 Potentially vulnerable (5:2.2.1-1.fc36)
Fedora 37
updates

mutt

2.2.9 Potentially vulnerable (5:2.2.9-1.fc37)
Fedora 37
release

mutt

2.2.7 Potentially vulnerable (5:2.2.7-1.fc37)
Fedora 38
updates

mutt

2.2.12 (5:2.2.12-1.fc38)
Fedora 38
release

mutt

2.2.9 Potentially vulnerable (5:2.2.9-2.fc38)
Fedora 39
development

mutt

2.2.10 Potentially vulnerable (5:2.2.10-2.fc39)
Fedora Rawhide
development

mutt

2.2.12 (5:2.2.12-1.fc40)

mail/mutt

2.2.12

mail-client/mutt

2.2.12

Mutt

1.5.24 Potentially vulnerable
HP-UX 11.31
ia64_64

mutt

2.2.12
HP-UX 11.31
ia64_64

mutt

1.14.7 Potentially vulnerable
HP-UX 11.31
hppa_32

mutt

1.14.7 Potentially vulnerable
HP-UX 11.31
hppa_32

mutt

1.8.3 Potentially vulnerable
HP-UX 11.31
ia64_32

mutt

1.8.3 Potentially vulnerable
HP-UX 11.31
hppa_32

mutt

1.5.21 Potentially vulnerable

mutt

2.2.12 (2.2.12-0.1)

mail-client/mutt

2.2.11 Potentially vulnerable

mail-client/mutt

2.2.10 Potentially vulnerable

mail-client/mutt

2.2.3 Potentially vulnerable

mail-client/mutt

2.2.12
Mageia 8
core/updates

mutt

2.0.7 Potentially vulnerable (1:2.0.7-1.1.mga8)
Mageia 8
core/release

mutt

2.0.5 Potentially vulnerable (1:2.0.5-1.mga8)
Mageia cauldron
core/release

mutt

2.2.12 (1:2.2.12-1.mga10)

mutt

2.2.12 (2.2.12-1)

mutt

2.2.12 (2.2.12-1)

mutt

2.2.12 (2.2.12-1)

mail/mutt

2.2.12

mutt

2.2.12 (2.2.12-1)

mutt

2.2.10 Potentially vulnerable

mutt

2.2.12

mutt

2.2.12

mutt

1.10.1 Potentially vulnerable (5:1.10.1-2.oe1)

mutt

2.1.3 Potentially vulnerable (5:2.1.3-1.oe2203)

mutt

2.2.12
OpenMandriva 4.0
main/release

mutt

1.11.4 Potentially vulnerable (1.11.4-1)
OpenMandriva 4.1
main/release

mutt

1.11.4 Potentially vulnerable (1.11.4-1)
OpenMandriva 4.2
main/release

mutt

1.11.4 Potentially vulnerable (1.11.4-1)
OpenMandriva 4.3
main/release

mutt

1.11.4 Potentially vulnerable (1.11.4-1)

mutt

2.1.0 Potentially vulnerable (2.1.0-1)
OpenMandriva Cooker
main/release

mutt

2.1.0 Potentially vulnerable (2.1.0-1)

mutt

2.2.12
openSUSE Leap 42.3
updates/oss

mutt

1.10.1 Potentially vulnerable (1.10.1-2.5.1)

mutt

1.8.2 Potentially vulnerable (1.8.2-1.7)
openSUSE Leap 15.0
updates/sle

mutt

1.10.1 Potentially vulnerable (1.10.1-150000.3.23.1)

mutt

1.9.1 Potentially vulnerable (1.9.1-lp150.1.15)
openSUSE Leap 15.1
updates/oss

mutt

1.10.1 Potentially vulnerable (1.10.1-lp151.2.12.1)
openSUSE Leap 15.1
updates/oss

mutt

1.10.1 Potentially vulnerable (1.10.1-lp151.2.15.1)
openSUSE Leap 15.1
updates/oss

mutt

1.10.1 Potentially vulnerable (1.10.1-lp151.2.3.1)
openSUSE Leap 15.1
updates/oss

mutt

1.10.1 Potentially vulnerable (1.10.1-lp151.2.6.1)
openSUSE Leap 15.1
updates/oss

mutt

1.10.1 Potentially vulnerable (1.10.1-lp151.2.9.1)
openSUSE Leap 15.1
updates/sle

mutt

1.10.1 Potentially vulnerable (1.10.1-150000.3.23.1)

mutt

1.10.1 Potentially vulnerable (1.10.1-lp151.1.4)
openSUSE Leap 15.2
updates/oss

mutt

1.10.1 Potentially vulnerable (1.10.1-lp152.3.12.1)
openSUSE Leap 15.2
updates/oss

mutt

1.10.1 Potentially vulnerable (1.10.1-lp152.3.15.1)
openSUSE Leap 15.2
updates/oss

mutt

1.10.1 Potentially vulnerable (1.10.1-lp152.3.3.1)
openSUSE Leap 15.2
updates/oss

mutt

1.10.1 Potentially vulnerable (1.10.1-lp152.3.6.1)
openSUSE Leap 15.2
updates/oss

mutt

1.10.1 Potentially vulnerable (1.10.1-lp152.3.9.1)
openSUSE Leap 15.2
updates/sle

mutt

1.10.1 Potentially vulnerable (1.10.1-150000.3.23.1)

mutt

1.10.1 Potentially vulnerable (1.10.1-lp152.2.9)

mutt

1.10.1 Potentially vulnerable (1.10.1-3.20.1)
openSUSE Leap 15.3
updates/sle

mutt

1.10.1 Potentially vulnerable (1.10.1-150000.3.23.1)

mutt

1.10.1 Potentially vulnerable (1.10.1-150000.3.23.1)
openSUSE Leap 15.4
updates/sle

mutt

1.10.1 Potentially vulnerable (1.10.1-150000.3.23.1)

mutt

1.10.1 Potentially vulnerable (1.10.1-150000.3.23.1)
openSUSE Leap 15.5
updates/sle

mutt

1.10.1 Potentially vulnerable (1.10.1-150000.3.23.1)

mutt

2.2.12 (2.2.12-3.1)

mutt

1.7.2 Potentially vulnerable (1.7.2-1)
Parabola
extra

mutt

2.2.12 (2.2.12-1)

mutt

2.0.5 Potentially vulnerable (2.0.5-4.1+deb11u3)
Pardus 21
updates/main

mutt

2.0.5 Potentially vulnerable (2.0.5-4.1+deb11u3)
Parrot
parrot/main

mutt

2.0.5 Potentially vulnerable (2.0.5-4.1+deb11u3)
Parrot
parrot-updates/main

mutt

2.0.5 Potentially vulnerable (2.0.5-4.1+deb11u3)

mutt

1.5.21 Potentially vulnerable (1.5.21-1pclos2014)
  • Summary:
    Text mode mail user agent
  • Category:
    • Networking/Mail

mail/mutt

2.2.12 (2.2.12nb2)

mutt

1.10.1 Potentially vulnerable (1.10.1-2.1+deb10u6)

mutt

2.2.12 (2.2.12-0.1~deb12u1)

mutt

2.0.5 Potentially vulnerable (2.0.5-4.1+deb11u3)

mutt

2.2.9 Potentially vulnerable (2.2.9-1+deb12u1)

mutt

2.2.12 (2.2.12-0.1)
Rocky Linux 8
AppStream

mutt

2.0.7 Potentially vulnerable (5:2.0.7-2.el8)
Rocky Linux 9
AppStream

mutt

2.2.6 Potentially vulnerable (5:2.2.6-1.el9)
Rosa 2021.1
contrib/release

mutt

2.2.12 (1:2.2.12-1)
Rosa Server 6.9
base/release

mutt

1.5.20 Potentially vulnerable (5:1.5.20-7.20091214hg736b6a.res6)
Rosa Server 6.9
base/release

mutt

1.5.20 Potentially vulnerable (5:1.5.20-8.20091214hg736b6a.res6)
Rosa Server 7.3
base/release

mutt

1.5.21 Potentially vulnerable (5:1.5.21-28.res7)
Rosa Server 7.5
base/release

mutt

1.5.21 Potentially vulnerable (5:1.5.21-26.res7)
Rosa Server 7.5
base/release

mutt

1.5.21 Potentially vulnerable (5:1.5.21-27.res7)

mutt

1.5.21 Potentially vulnerable (5:1.5.21-23.el7)
  • Summary:
    A text mode mail user agent
  • Category:
    • Applications/Internet
  • License:
    • GPLv2+ and Public Domain
  • Link(s):

mutt

1.5.21 Potentially vulnerable (5:1.5.21-26.el7)
  • Summary:
    A text mode mail user agent
  • Category:
    • Applications/Internet
  • License:
    • GPLv2+ and Public Domain
  • Link(s):

mutt

1.5.21 Potentially vulnerable (5:1.5.21-27.el7)
  • Summary:
    A text mode mail user agent
  • Category:
    • Applications/Internet
  • License:
    • GPLv2+ and Public Domain
  • Link(s):

mutt

1.5.21 Potentially vulnerable (5:1.5.21-28.el7_5)
  • Summary:
    A text mode mail user agent
  • Category:
    • Applications/Internet
  • License:
    • GPLv2+ and Public Domain
  • Link(s):

mutt

1.5.21 Potentially vulnerable (5:1.5.21-29.el7)
  • Summary:
    A text mode mail user agent
  • Category:
    • Applications/Internet
  • License:
    • GPLv2+ and Public Domain
  • Link(s):

mutt

1.10.1 Potentially vulnerable
Slackware 14.2
slackware

mutt

1.6.1 Potentially vulnerable
Slackware 15.0
slackware

mutt

2.1.5 Potentially vulnerable

mutt

2.2.12

mutt

1.10.1 Potentially vulnerable
Slackware64 14.2
slackware64

mutt

1.6.1 Potentially vulnerable
Slackware64 15.0
slackware64

mutt

2.1.5 Potentially vulnerable

mutt

2.2.12

mutt

1.10.1 Potentially vulnerable

mutt

1.6.1 Potentially vulnerable

mutt

2.1.5 Potentially vulnerable

mutt

1.14.7 Potentially vulnerable

mutt

1.10.0 Potentially vulnerable

mutt

1.10.0 Potentially vulnerable

mutt

2.2.12

mutt-dbginfo

2.2.12

mutt

2.2.12
Trisquel 10.0
nabia-updates/main

mutt

1.13.2 Potentially vulnerable (1.13.2-1ubuntu0.6)
Trisquel 10.0
nabia-updates/main

mutt

1.13.2 Potentially vulnerable (1.13.2-1ubuntu0.4)
Trisquel 10.0
nabia-security/main

mutt

1.13.2 Potentially vulnerable (1.13.2-1ubuntu0.6)
Trisquel 10.0
nabia-security/main

mutt

1.13.2 Potentially vulnerable (1.13.2-1ubuntu0.4)
Trisquel 11.0
aramo/main

mutt

2.1.4 Potentially vulnerable (2.1.4-1build1)
Trisquel 11.0
aramo-updates/main

mutt

2.1.4 Potentially vulnerable (2.1.4-1ubuntu1.2)
Trisquel 11.0
aramo-security/main

mutt

2.1.4 Potentially vulnerable (2.1.4-1ubuntu1.2)

mutt

2.2.12 (2.2.12_2)

Mutt

2.2.12