Versions Packages Information History CVEs Related Badges Report

Versions for mutt

290 package(s) known

Repository Package name Version Category Maintainer(s)
Adélie Linux current
user
mutt-doc 2.2.10 Potentially vulnerable - me@zv.io
Adélie Linux current
user
mutt-dbg 2.2.10 Potentially vulnerable - me@zv.io
Adélie Linux current
user
mutt 2.2.10 Potentially vulnerable - me@zv.io
Adélie Linux current
user
mutt-lang 2.2.10 Potentially vulnerable - me@zv.io
AIX Toolbox mutt 2.1.3 Potentially vulnerable Unspecified -
AlmaLinux 8
AppStream
mutt 2.0.7 Potentially vulnerable Applications/Internet packager@almalinux.org
AlmaLinux 9
AppStream
mutt 2.2.6 Potentially vulnerable Unspecified packager@almalinux.org
Alpine Linux 3.8
main
mutt 1.10.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
mutt-lang 1.10.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
mutt-doc 1.10.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
community
mutt 1.11.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
community
mutt-doc 1.11.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
community
mutt-lang 1.11.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
community
mutt-lang 1.12.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
community
mutt 1.12.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
community
mutt-doc 1.12.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
mutt-lang 1.13.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
mutt-doc 1.13.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
mutt 1.13.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
mutt-doc 1.14.7 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
mutt 1.14.7 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
mutt-lang 1.14.7 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
mutt-doc 2.0.7 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
mutt 2.0.7 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
mutt-lang 2.0.7 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
mutt-lang 2.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
mutt 2.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
mutt-doc 2.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
community
mutt-lang 2.2.3 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
community
mutt-doc 2.2.3 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
community
mutt 2.2.3 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
community
mutt 2.2.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
community
mutt-doc 2.2.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
community
mutt-lang 2.2.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
community
mutt-doc 2.2.12 - ncopa@alpinelinux.org
Alpine Linux 3.17
community
mutt-lang 2.2.12 - ncopa@alpinelinux.org
Alpine Linux 3.17
community
mutt 2.2.12 - ncopa@alpinelinux.org
Alpine Linux 3.18
community
mutt 2.2.12 - ncopa@alpinelinux.org
Alpine Linux 3.18
community
mutt-doc 2.2.12 - ncopa@alpinelinux.org
Alpine Linux 3.18
community
mutt-lang 2.2.12 - ncopa@alpinelinux.org
Alpine Linux Edge
community
mutt 2.2.12 - ncopa@alpinelinux.org
Alpine Linux Edge
community
mutt-doc 2.2.12 - ncopa@alpinelinux.org
Alpine Linux Edge
community
mutt-lang 2.2.12 - ncopa@alpinelinux.org
ALT Linux p9 mutt 1.10.1 Potentially vulnerable Networking/Mail glebfm@altlinux.org
ALT Linux p10 mutt 2.1.1.0.3.g6c0f75cca Potentially vulnerable Networking/Mail glebfm@altlinux.org
ALT Sisyphus mutt 2.1.1.0.3.g6c0f75cca Potentially vulnerable Networking/Mail glebfm@altlinux.org
Amazon Linux 1
main
mutt 1.5.20 Potentially vulnerable Applications/Internet -
Amazon Linux 2 mutt 1.5.21 Potentially vulnerable Applications/Internet -
Amazon Linux 2 mutt 1.5.21 Potentially vulnerable Applications/Internet -
Amazon Linux 2 mutt 1.5.21 Potentially vulnerable Applications/Internet -
antiX-17
main
mutt 2.2.0 Potentially vulnerable main mutt@packages.debian.org, antonio@debian.org, paravoid@debian.org
antiX-19
main
mutt 2.2.11 Potentially vulnerable main mutt@packages.debian.org, antonio@debian.org, paravoid@debian.org
antiX-21
main
mutt 2.2.11 Potentially vulnerable main mutt@packages.debian.org, antonio@debian.org, paravoid@debian.org
Arch
extra
mutt 2.2.12 - -
Arch Linux 32 i486
extra
mutt 2.2.9 Potentially vulnerable - -
Arch Linux 32 i686
extra
mutt 2.2.9 Potentially vulnerable - -
Arch Linux 32 pentium4
extra
mutt 2.2.9 Potentially vulnerable - -
Arch Linux ARM aarch64
extra
mutt 2.2.12 - -
AUR mutt-git 2.2.10.r62.g5347d1c5 - a821@aur
AUR mutt-slang 2.2.11 Potentially vulnerable - zootboy@aur
AUR mutt-kiss 2.2.10 Potentially vulnerable - phillid@aur
Artix
world
mutt 2.2.12 - -
Ataraxia GNU/Linux mutt 2.1.0 Potentially vulnerable mail nagakamira@gmail.com
Buildroot 2023.02.x mutt 2.2.12 - -
Buildroot 2023.05.x mutt 2.2.12 - -
Buildroot master mutt 2.2.12 - -
CentOS 6
os
mutt 1.5.20 Potentially vulnerable Applications/Internet -
CentOS 6
updates
mutt 1.5.20 Potentially vulnerable Applications/Internet -
CentOS 7
os
mutt 1.5.21 Potentially vulnerable Applications/Internet -
CentOS 8
AppStream
mutt 2.0.7 Potentially vulnerable Applications/Internet bugs@centos.org
CentOS Stream 8
AppStream
mutt 2.0.7 Potentially vulnerable Applications/Internet bugs@centos.org
CentOS Stream 8
AppStream
mutt 2.0.7 Potentially vulnerable Applications/Internet bugs@centos.org
CentOS Stream 8
AppStream
mutt 2.0.6 Potentially vulnerable Applications/Internet bugs@centos.org
CentOS Stream 8
AppStream
mutt 1.10.1 Potentially vulnerable Applications/Internet bugs@centos.org
CentOS Stream 9
AppStream
mutt 2.2.6 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 9
AppStream
mutt 2.1.5 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 9
AppStream
mutt 2.0.6 Potentially vulnerable Unspecified builder@centos.org
CRUX 3.4
opt
mutt 1.12.1 Potentially vulnerable - jue@crux.nu
CRUX 3.5
opt
mutt 2.0.3 Potentially vulnerable - jue@crux.nu
CRUX 3.6
opt
mutt 2.2.7 Potentially vulnerable - jue@crux.nu
CRUX 3.7
opt
mutt 2.2.12 - jue@crux.nu
Cygwin mutt 2.2.10 Potentially vulnerable Mail marco.atzeri@cygwin
Cygwin mutt-debuginfo 2.2.10 Potentially vulnerable Debug marco.atzeri@cygwin
Debian 10
buster/updates/main
mutt 1.10.1 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org, paravoid@debian.org
Debian 10
buster/main
mutt 1.10.1 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org, paravoid@debian.org
Debian 10 Backports
buster-backports/main
mutt 2.0.2 Potentially vulnerable misc mutt@packages.debian.org, antonio@debian.org, paravoid@debian.org
Debian 11
bullseye/main
mutt 2.0.5 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org
Debian 11
bullseye-security/main
mutt 2.0.5 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org
Debian 12
bookworm-security/main
mutt 2.2.9 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org
Debian 12
bookworm/main
mutt 2.2.9 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org
Debian 13
trixie/main
mutt 2.2.12 mail mutt@packages.debian.org, antonio@debian.org
Debian Unstable
sid/main
mutt 2.2.12 mail mutt@packages.debian.org, antonio@debian.org
Deepin
main
mutt 1.10.1.1 Potentially vulnerable - mutt@packages.debian.org, antonio@debian.org, paravoid@debian.org
Devuan 3.0
beowulf/main
mutt 1.10.1 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org, paravoid@debian.org
Devuan 4.0
chimaera/main
mutt 2.0.5 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org
Devuan Unstable
unstable/main
mutt 2.2.12 mail mutt@packages.debian.org, antonio@debian.org
DistroWatch.com mutt 2.2.12 - -
Entware
mipselsf-k3.4
mutt 2.1.5 Potentially vulnerable mail phil@zankapfel.net
Entware
mipssf-k3.4
mutt 2.1.5 Potentially vulnerable mail phil@zankapfel.net
Entware
x64-k3.2
mutt 2.1.5 Potentially vulnerable mail phil@zankapfel.net
Entware
aarch64-k3.10
mutt 2.1.5 Potentially vulnerable mail phil@zankapfel.net
Entware
armv5sf-k3.2
mutt 2.1.5 Potentially vulnerable mail phil@zankapfel.net
Entware
armv7sf-k2.6
mutt 2.1.5 Potentially vulnerable mail phil@zankapfel.net
Entware
armv7sf-k3.2
mutt 2.1.5 Potentially vulnerable mail phil@zankapfel.net
EuroLinux 8
appstream
mutt 2.0.7 Potentially vulnerable Applications/Internet -
EuroLinux 8
appstream
mutt 1.10.1 Potentially vulnerable Applications/Internet -
EuroLinux 8
appstream
mutt 1.10.1 Potentially vulnerable Applications/Internet -
EuroLinux 9
appstream
mutt 2.2.6 Potentially vulnerable Unspecified -
EuroLinux 9
appstream
mutt 2.1.5 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
mutt 2.1.5 Potentially vulnerable Unspecified -
EuroLinux 9
appstream
mutt 2.0.6 Potentially vulnerable Unspecified -
Exherbo
arbor
mail-client/mutt 2.2.12 mail-client fallback-mnt-exherbo@repology
Fedora 26
updates
mutt 1.9.1 Potentially vulnerable Applications/Internet -
Fedora 26
release
mutt 1.8.2 Potentially vulnerable Applications/Internet -
Fedora 27
updates
mutt 1.9.2 Potentially vulnerable Applications/Internet -
Fedora 27
release
mutt 1.9.1 Potentially vulnerable Applications/Internet -
Fedora 28
updates
mutt 1.11.3 Potentially vulnerable Unspecified -
Fedora 28
release
mutt 1.9.3 Potentially vulnerable Applications/Internet -
Fedora 29
updates
mutt 1.12.1 Potentially vulnerable Unspecified -
Fedora 29
release
mutt 1.10.1 Potentially vulnerable Applications/Internet -
Fedora 30
updates
mutt 1.13.3 Potentially vulnerable Unspecified -
Fedora 30
release
mutt 1.11.4 Potentially vulnerable Unspecified -
Fedora 31
updates
mutt 1.14.6 Potentially vulnerable Unspecified -
Fedora 31
release
mutt 1.12.1 Potentially vulnerable Unspecified -
Fedora 32
updates
mutt 2.0.5 Potentially vulnerable Unspecified -
Fedora 32
release
mutt 1.13.4 Potentially vulnerable Unspecified -
Fedora 33
updates
mutt 2.0.5 Potentially vulnerable Unspecified -
Fedora 33
release
mutt 1.14.6 Potentially vulnerable Unspecified -
Fedora 34
updates
mutt 2.0.7 Potentially vulnerable Unspecified -
Fedora 34
release
mutt 2.0.6 Potentially vulnerable Unspecified -
Fedora 35
updates
mutt 2.1.5 Potentially vulnerable Unspecified -
Fedora 35
release
mutt 2.1.1 Potentially vulnerable Unspecified -
Fedora 36
updates
mutt 2.2.7 Potentially vulnerable Unspecified -
Fedora 36
release
mutt 2.2.1 Potentially vulnerable Unspecified -
Fedora 37
updates
mutt 2.2.9 Potentially vulnerable Unspecified -
Fedora 37
release
mutt 2.2.7 Potentially vulnerable Unspecified -
Fedora 38
release
mutt 2.2.9 Potentially vulnerable Unspecified -
Fedora 39
development
mutt 2.2.10 Potentially vulnerable Unspecified -
Fedora Rawhide
development
mutt 2.2.11 Potentially vulnerable Unspecified -
FreeBSD Ports mail/mutt 2.2.12 mail dereks@lifeofadishwasher.com
Gentoo mail-client/mutt 2.2.12 mail-client grobian@gentoo.org
Gentoo mail-client/mutt 2.2.10 Potentially vulnerable mail-client grobian@gentoo.org
Gentoo mail-client/mutt 2.2.3 Potentially vulnerable mail-client grobian@gentoo.org
GNU Guix mutt 2.2.12 - -
GoboLinux Mutt 1.5.24 Potentially vulnerable - -
HaikuPorts master mail-client/mutt 1.14.6 Potentially vulnerable mail-client -
Homebrew mutt HEAD - -
Homebrew mutt 2.2.12 - -
HP-UX 11.31
ia64_64
mutt 2.2.12 - -
HP-UX 11.31
hppa_32
mutt 1.14.7 Potentially vulnerable - -
HP-UX 11.31
ia64_64
mutt 1.14.7 Potentially vulnerable - -
HP-UX 11.31
hppa_32
mutt 1.8.3 Potentially vulnerable - -
HP-UX 11.31
ia64_32
mutt 1.8.3 Potentially vulnerable - -
HP-UX 11.31
hppa_32
mutt 1.5.21 Potentially vulnerable - -
Kali Linux Rolling
main
mutt 2.2.12 mail mutt@packages.debian.org, antonio@debian.org
LiGurOS stable mail-client/mutt 2.2.11 Potentially vulnerable mail-client grobian@gentoo.org
LiGurOS stable mail-client/mutt 2.2.10 Potentially vulnerable mail-client grobian@gentoo.org
LiGurOS stable mail-client/mutt 2.2.3 Potentially vulnerable mail-client grobian@gentoo.org
LiGurOS develop mail-client/mutt 2.2.12 mail-client grobian@gentoo.org
LiGurOS develop mail-client/mutt 2.2.10 Potentially vulnerable mail-client grobian@gentoo.org
LiGurOS develop mail-client/mutt 2.2.3 Potentially vulnerable mail-client grobian@gentoo.org
MacPorts mutt 2.2.10 Potentially vulnerable mail l2dy@macports, l2dy@github
Mageia 8
core/updates
mutt 2.0.7 Potentially vulnerable Networking/Mail -
Mageia 8
core/release
mutt 2.0.5 Potentially vulnerable Networking/Mail -
Mageia cauldron
core/release
mutt 2.2.10 Potentially vulnerable Networking/Mail -
Manjaro Stable
extra
mutt 2.2.12 - -
Manjaro Testing
extra
mutt 2.2.12 - -
Manjaro Unstable
extra
mutt 2.2.12 - -
MidnightBSD mports mail/mutt 2.2.10 Potentially vulnerable mail -
MSYS2 msys2
x86_64
mutt 2.2.12 net-utils -
MX Linux MX-19 Testing mutt 2.0.2 Potentially vulnerable mail swamprabbit@mxlinux.org, antonio@debian.org, paravoid@debian.org
nixpkgs stable 21.11 mutt 2.1.5 Potentially vulnerable - rnhmjoj@inventati.org
nixpkgs stable 21.11 mutt 2.1.5 Potentially vulnerable - rnhmjoj@inventati.org
nixpkgs stable 22.05 mutt 2.2.5 Potentially vulnerable - rnhmjoj@inventati.org
nixpkgs stable 22.05 mutt 2.2.5 Potentially vulnerable - rnhmjoj@inventati.org
nixpkgs stable 22.11 mutt 2.2.10 Potentially vulnerable - rnhmjoj@inventati.org
nixpkgs stable 23.05 mutt 2.2.12 - rnhmjoj@inventati.org
nixpkgs unstable mutt 2.2.12 - rnhmjoj@inventati.org
NOIR Linux Main
extra
mutt 2.2.10 Potentially vulnerable - mmatongo_@hotmail.com
OpenBSD Ports mail/mutt 2.2.12 mail stu.ports@spacehopper.org
OpenBSD Ports mail/mutt 2.2.12 mail stu.ports@spacehopper.org
OpenBSD Ports mail/mutt 2.2.12 mail stu.ports@spacehopper.org
OpenBSD Ports mail/mutt 2.2.12 mail stu.ports@spacehopper.org
OpenBSD Ports mail/mutt 2.2.12 mail stu.ports@spacehopper.org
openEuler 20.03
source
mutt 1.10.1 Potentially vulnerable Unspecified -
openEuler 22.03
source
mutt 2.1.3 Potentially vulnerable Unspecified -
OpenIndiana packages
hipster
mutt 2.2.12 Applications/Internet -
OpenIndiana packages
hipster
mutt 2.2.11 Potentially vulnerable Applications/Internet -
OpenMandriva 4.0
main/release
mutt 1.11.4 Potentially vulnerable Networking/Mail bero@lindev.ch
OpenMandriva 4.1
main/release
mutt 1.11.4 Potentially vulnerable Networking/Mail nobodydead@gmail.com
OpenMandriva 4.2
main/release
mutt 1.11.4 Potentially vulnerable Networking/Mail bero@lindev.ch
OpenMandriva 4.3
main/release
mutt 1.11.4 Potentially vulnerable Networking/Mail bero@lindev.ch
OpenMandriva Rolling
main/release
mutt 2.1.0 Potentially vulnerable Networking/Mail bero+massbuild@lindev.ch
OpenMandriva Cooker
main/release
mutt 2.1.0 Potentially vulnerable Networking/Mail bero+massbuild@lindev.ch
OpenPKG mutt 2.2.12 Mail -
openSUSE Leap 42.3
updates/oss
mutt 1.10.1 Potentially vulnerable Productivity/Networking/Email/Clients -
openSUSE Leap 42.3
main/oss
mutt 1.8.2 Potentially vulnerable Productivity/Networking/Email/Clients -
openSUSE Leap 15.0
main/oss
mutt 1.9.1 Potentially vulnerable Productivity/Networking/Email/Clients -
openSUSE Leap 15.1
main/oss
mutt 1.10.1 Potentially vulnerable Productivity/Networking/Email/Clients -
openSUSE Leap 15.1
updates/oss
mutt 1.10.1 Potentially vulnerable Productivity/Networking/Email/Clients -
openSUSE Leap 15.1
updates/oss
mutt 1.10.1 Potentially vulnerable Productivity/Networking/Email/Clients -
openSUSE Leap 15.1
updates/oss
mutt 1.10.1 Potentially vulnerable Productivity/Networking/Email/Clients -
openSUSE Leap 15.1
updates/oss
mutt 1.10.1 Potentially vulnerable Productivity/Networking/Email/Clients -
openSUSE Leap 15.1
updates/oss
mutt 1.10.1 Potentially vulnerable Productivity/Networking/Email/Clients -
openSUSE Leap 15.2
updates/oss
mutt 1.10.1 Potentially vulnerable Productivity/Networking/Email/Clients -
openSUSE Leap 15.2
updates/oss
mutt 1.10.1 Potentially vulnerable Productivity/Networking/Email/Clients -
openSUSE Leap 15.2
updates/oss
mutt 1.10.1 Potentially vulnerable Productivity/Networking/Email/Clients -
openSUSE Leap 15.2
updates/oss
mutt 1.10.1 Potentially vulnerable Productivity/Networking/Email/Clients -
openSUSE Leap 15.2
updates/oss
mutt 1.10.1 Potentially vulnerable Productivity/Networking/Email/Clients -
openSUSE Leap 15.2
main/oss
mutt 1.10.1 Potentially vulnerable Productivity/Networking/Email/Clients -
openSUSE Leap 15.3
main/oss
mutt 1.10.1 Potentially vulnerable Productivity/Networking/Email/Clients -
openSUSE Leap 15.4
main/oss
mutt 1.10.1 Potentially vulnerable Productivity/Networking/Email/Clients -
openSUSE Leap 15.5
main/oss
mutt 1.10.1 Potentially vulnerable Productivity/Networking/Email/Clients -
openSUSE Tumbleweed
src-oss
mutt 2.2.12 Productivity/Networking/Email/Clients -
OpenWrt 17.01 x86_64
packages
mutt 1.7.2 Potentially vulnerable mail phil@zankapfel.net
OpenWrt 18.06 x86_64
packages
mutt 1.9.4 Potentially vulnerable mail phil@zankapfel.net
OpenWrt 19.07 x86_64
packages
mutt 1.12.0 Potentially vulnerable mail phil@zankapfel.net
OpenWrt 21.02 x86_64
packages
mutt 1.14.7 Potentially vulnerable mail phil@zankapfel.net
OpenWrt 22.03 x86_64
packages
mutt 2.1.5 Potentially vulnerable mail phil@zankapfel.net
Parabola
extra
mutt 2.2.12 - -
Pardus 21
main
mutt 2.0.5 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org
Pardus 21
updates/main
mutt 2.0.5 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org
Parrot
parrot/main
mutt 2.0.5 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org
Parrot
parrot-updates/main
mutt 2.0.5 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org
PCLinuxOS mutt 1.5.21 Potentially vulnerable Networking/Mail -
pkgsrc current mail/mutt 2.2.12 mail tonio@netbsd.org
PLD Linux mutt 2.1.4 Potentially vulnerable - -
PureOS Amber mutt 1.10.1 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org, paravoid@debian.org
PureOS landing mutt 2.2.9 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org
Raspbian Oldstable
main
mutt 2.0.5 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org
Raspbian Stable
main
mutt 2.2.9 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org
Raspbian Testing
main
mutt 2.2.12 mail mutt@packages.debian.org, antonio@debian.org
Ravenports mutt 2.2.12 mail fallback-mnt-ravenports@repology
Rocky Linux 8
AppStream
mutt 2.0.7 Potentially vulnerable Applications/Internet infrastructure@rockylinux.org
Rocky Linux 9
AppStream
mutt 2.2.6 Potentially vulnerable Unspecified releng@rockylinux.org
Rosa 2014.1
contrib/updates
mutt 1.5.23 Potentially vulnerable - -
Rosa 2014.1
main/release
mutt 1.5.23 Potentially vulnerable - -
Rosa 2016.1
contrib/release
mutt 1.5.23 Potentially vulnerable - -
Rosa 2021.1
contrib/release
mutt 2.2.7 Potentially vulnerable Networking/Mail alexander@mezon.ru
Rosa Server 6.9
base/release
mutt 1.5.20 Potentially vulnerable Applications/Internet andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
mutt 1.5.20 Potentially vulnerable Applications/Internet andrew.lukoshko@rosalab.ru
Rosa Server 7.3
base/release
mutt 1.5.21 Potentially vulnerable Applications/Internet alex2048@mail.ru
Rosa Server 7.5
base/release
mutt 1.5.21 Potentially vulnerable Applications/Internet alex2048@mail.ru
Rosa Server 7.5
base/release
mutt 1.5.21 Potentially vulnerable Applications/Internet alex2048@mail.ru
Scientific Linux 7.x mutt 1.5.21 Potentially vulnerable Applications/Internet -
Scientific Linux 7.x mutt 1.5.21 Potentially vulnerable Applications/Internet -
Scientific Linux 7.x mutt 1.5.21 Potentially vulnerable Applications/Internet -
Scientific Linux 7.x mutt 1.5.21 Potentially vulnerable Applications/Internet -
Scientific Linux 7.x mutt 1.5.21 Potentially vulnerable Applications/Internet -
Slackware 14.2
patches
mutt 1.10.1 Potentially vulnerable - volkerdi@slackware.com
Slackware 14.2
slackware
mutt 1.6.1 Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
slackware
mutt 2.1.5 Potentially vulnerable - volkerdi@slackware.com
Slackware current
slackware
mutt 2.2.12 - volkerdi@slackware.com
Slackware64 14.2
patches
mutt 1.10.1 Potentially vulnerable - volkerdi@slackware.com
Slackware64 14.2
slackware64
mutt 1.6.1 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
slackware64
mutt 2.1.5 Potentially vulnerable - volkerdi@slackware.com
Slackware64 current
slackware64
mutt 2.2.12 - volkerdi@slackware.com
Slackwarearm 14.2
patches
mutt 1.10.1 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 14.2
slackware
mutt 1.6.1 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 15.0
slackware
mutt 2.1.5 Potentially vulnerable - volkerdi@slackware.com
SliTaz Cooking mutt 1.14.7 Potentially vulnerable network paul@slitaz.org
SliTaz Next mutt 1.10.0 Potentially vulnerable network paul@slitaz.org
SliTaz Next mutt 1.10.0 Potentially vulnerable network paul@slitaz.org
Solus mutt 2.2.12 network.mail reilly@reillybrogan.com
Solus mutt-dbginfo 2.2.12 debug reilly@reillybrogan.com
T2 SDE mutt 2.2.9 Potentially vulnerable extra/network rene@t2-project.org
Termux mutt 2.2.12 - termux@github
Trisquel 10.0
nabia/main
mutt 1.13.2 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org, paravoid@debian.org
Trisquel 10.0
nabia-updates/main
mutt 1.13.2 Potentially vulnerable mail ubuntu-devel-discuss@lists.ubuntu.com, antonio@debian.org, paravoid@debian.org
Trisquel 10.0
nabia-updates/main
mutt 1.13.2 Potentially vulnerable mail ubuntu-devel-discuss@lists.ubuntu.com, antonio@debian.org, paravoid@debian.org
Trisquel 10.0
nabia-security/main
mutt 1.13.2 Potentially vulnerable mail ubuntu-devel-discuss@lists.ubuntu.com, antonio@debian.org, paravoid@debian.org
Trisquel 10.0
nabia-security/main
mutt 1.13.2 Potentially vulnerable mail ubuntu-devel-discuss@lists.ubuntu.com, antonio@debian.org, paravoid@debian.org
Trisquel 11.0
aramo/main
mutt 2.1.4 Potentially vulnerable mail ubuntu-devel-discuss@lists.ubuntu.com, antonio@debian.org
Trisquel 11.0
aramo-updates/main
mutt 2.1.4 Potentially vulnerable mail ubuntu-devel-discuss@lists.ubuntu.com, antonio@debian.org
Trisquel 11.0
aramo-security/main
mutt 2.1.4 Potentially vulnerable mail ubuntu-devel-discuss@lists.ubuntu.com, antonio@debian.org
Ubuntu 14.04
trusty-updates/main
mutt 1.5.21 Potentially vulnerable mail ubuntu-devel-discuss@lists.ubuntu.com, myon@debian.org
Ubuntu 14.04
trusty/main
mutt 1.5.21 Potentially vulnerable mail ubuntu-devel-discuss@lists.ubuntu.com, myon@debian.org
Ubuntu 16.04
xenial-updates/main
mutt 1.5.24 Potentially vulnerable mail ubuntu-devel-discuss@lists.ubuntu.com, myon@debian.org
Ubuntu 16.04
xenial/main
mutt 1.5.24 Potentially vulnerable mail antonio@dyne.org, myon@debian.org
Ubuntu 18.04
bionic-updates/main
mutt 1.9.4 Potentially vulnerable mail ubuntu-devel-discuss@lists.ubuntu.com, antonio@debian.org, paravoid@debian.org
Ubuntu 18.04
bionic/main
mutt 1.9.4 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org, paravoid@debian.org
Ubuntu 20.04
focal/main
mutt 1.13.2 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org, paravoid@debian.org
Ubuntu 20.04
focal-updates/main
mutt 1.13.2 Potentially vulnerable mail ubuntu-devel-discuss@lists.ubuntu.com, antonio@debian.org, paravoid@debian.org
Ubuntu 22.04
jammy/main
mutt 2.1.4 Potentially vulnerable mail ubuntu-devel-discuss@lists.ubuntu.com, antonio@debian.org
Ubuntu 22.04
jammy-updates/main
mutt 2.1.4 Potentially vulnerable mail ubuntu-devel-discuss@lists.ubuntu.com, antonio@debian.org
Ubuntu 23.04
lunar/main
mutt 2.2.9 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org
Ubuntu 23.04
lunar-updates/main
mutt 2.2.9 Potentially vulnerable mail ubuntu-devel-discuss@lists.ubuntu.com, antonio@debian.org
Ubuntu 23.10
mantic/main
mutt 2.2.9 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org
Void Linux x86_64
x86_64
mutt 2.2.12 - congdanhqx@gmail.com
Wikidata Mutt 2.2.12 - -