Versions Packages Information History CVEs Related Badges Report

Versions for mutt

246 package(s) known

Repository Package name Version Category Maintainer(s)
Adélie Linux current
user
mutt-lang 1.14.6 Potentially vulnerable - maxcrees@me.com
Adélie Linux current
user
mutt-doc 1.14.6 Potentially vulnerable - maxcrees@me.com
Adélie Linux current
user
mutt-dbg 1.14.6 Potentially vulnerable - maxcrees@me.com
Adélie Linux current
user
mutt 1.14.6 Potentially vulnerable - maxcrees@me.com
AIX Toolbox mutt 1.4.2.1 Potentially vulnerable Networking/Mail -
AlmaLinux 8
AppStream
mutt 1.10.1 Potentially vulnerable Applications/Internet packager@cloudlinux.com
Alpine Linux 3.8
main
mutt 1.10.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
mutt-lang 1.10.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
mutt-doc 1.10.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
community
mutt 1.11.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
community
mutt-doc 1.11.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
community
mutt-lang 1.11.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
community
mutt-lang 1.12.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
community
mutt 1.12.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
community
mutt-doc 1.12.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
mutt-lang 1.13.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
mutt-doc 1.13.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
mutt 1.13.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
mutt-doc 1.14.7 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
mutt 1.14.7 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
mutt-lang 1.14.7 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
mutt-doc 2.0.7 - ncopa@alpinelinux.org
Alpine Linux 3.13
community
mutt 2.0.7 - ncopa@alpinelinux.org
Alpine Linux 3.13
community
mutt-lang 2.0.7 - ncopa@alpinelinux.org
Alpine Linux 3.14
community
mutt-lang 2.1.0 - ncopa@alpinelinux.org
Alpine Linux 3.14
community
mutt 2.1.0 - ncopa@alpinelinux.org
Alpine Linux 3.14
community
mutt-doc 2.1.0 - ncopa@alpinelinux.org
Alpine Linux Edge
community
mutt 2.1.3 - ncopa@alpinelinux.org
Alpine Linux Edge
community
mutt-doc 2.1.3 - ncopa@alpinelinux.org
Alpine Linux Edge
community
mutt-lang 2.1.3 - ncopa@alpinelinux.org
ALT Linux p9 mutt 1.10.1 Potentially vulnerable Networking/Mail glebfm@altlinux.org
ALT Linux p10 mutt 2.1.1.0.3.g6c0f75cca Networking/Mail glebfm@altlinux.org
ALT Sisyphus mutt 2.1.1.0.3.g6c0f75cca Networking/Mail glebfm@altlinux.org
Amazon Linux 1
main
mutt 1.5.20 Potentially vulnerable Applications/Internet -
Amazon Linux 2 mutt 1.5.21 Potentially vulnerable Applications/Internet -
Amazon Linux 2 mutt 1.5.21 Potentially vulnerable Applications/Internet -
antiX-19
main
mutt 2.1.3 main mutt@packages.debian.org, antonio@debian.org, paravoid@debian.org
AOSC mutt 1.14.7 Potentially vulnerable mail fallback-mnt-aosc@repology
Arch
extra
mutt 2.1.3 - -
AUR mutt-git 6959.42e2d07a - louipc@aur
AUR mutt-slang 2.1.1 - zootboy@aur
AUR mutt-kiss 1.14.7 Potentially vulnerable - phillid@aur
Artix
world
mutt 2.1.3 - -
Astra Orel Stable
main
mutt 1.7.2 Potentially vulnerable mail pkg-mutt-maintainers@lists.alioth.debian.org, antonio@debian.org, paravoid@debian.org
Astra Orel Current
main
mutt 1.7.2 Potentially vulnerable mail pkg-mutt-maintainers@lists.alioth.debian.org, antonio@debian.org, paravoid@debian.org
Ataraxia GNU/Linux mutt 2.1.0 mail nagakamira@gmail.com
CentOS 6
os
mutt 1.5.20 Potentially vulnerable Applications/Internet -
CentOS 6
updates
mutt 1.5.20 Potentially vulnerable Applications/Internet -
CentOS 7
os
mutt 1.5.21 Potentially vulnerable Applications/Internet -
CentOS 8
AppStream
mutt 1.10.1 Potentially vulnerable Applications/Internet bugs@centos.org
CRUX 3.4
opt
mutt 1.12.1 Potentially vulnerable - jue@crux.nu
CRUX 3.5
opt
mutt 2.0.3 Potentially vulnerable - jue@crux.nu
CRUX 3.6
opt
mutt 2.1.3 - jue@crux.nu
Cygwin mutt 2.1.1 Mail marco.atzeri@cygwin
Cygwin mutt-debuginfo 2.1.1 Debug marco.atzeri@cygwin
Debian 8
jessie/main
mutt 1.5.23 Potentially vulnerable mail antonio@dyne.org, myon@debian.org
Debian 9
stretch/main
mutt 1.7.2 Potentially vulnerable mail pkg-mutt-maintainers@lists.alioth.debian.org, antonio@debian.org, paravoid@debian.org
Debian 10
buster/main
mutt 1.10.1 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org, paravoid@debian.org
Debian 10 Backports
buster-backports/main
mutt 2.0.2 Potentially vulnerable misc mutt@packages.debian.org, antonio@debian.org, paravoid@debian.org
Debian 11
bullseye/main
mutt 2.0.5 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org
Debian 12
bookworm/main
mutt 2.0.5 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org
Debian Stable
stable/main
mutt 2.0.5 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org
Debian Testing
testing/main
mutt 2.0.5 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org
Debian Unstable
sid/main
mutt 2.0.5 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org
Deepin
main
mutt 1.10.1.1 Potentially vulnerable - mutt@packages.debian.org, antonio@debian.org, paravoid@debian.org
Devuan 1.0 (Jessie)
jessie/main
mutt 1.5.23 Potentially vulnerable mail antonio@dyne.org, myon@debian.org
Devuan 2.0 (ASCII)
ascii/main
mutt 1.7.2 Potentially vulnerable mail pkg-mutt-maintainers@lists.alioth.debian.org, antonio@debian.org, paravoid@debian.org
Devuan 3.0 (Beowulf)
beowulf/main
mutt 1.10.1 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org, paravoid@debian.org
Devuan 4.0 (Chimaera)
chimaera/main
mutt 2.0.5 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org
Devuan Unstable
unstable/main
mutt 2.0.5 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org
DistroWatch.com mutt 2.1.3 - -
DPorts mail/mutt 2.1.0 mail dereks@lifeofadishwasher.com
DPorts japanese/mutt-devel 1.5.21.j1 Potentially vulnerable japanese st@be.to
Entware
mipssf-k3.4
mutt 1.14.7 Potentially vulnerable mail phil@zankapfel.net
Entware
x64-k3.2
mutt 1.14.7 Potentially vulnerable mail phil@zankapfel.net
Entware
mipselsf-k3.4
mutt 1.14.7 Potentially vulnerable mail phil@zankapfel.net
Entware
aarch64-k3.10
mutt 1.14.7 Potentially vulnerable mail phil@zankapfel.net
Entware
armv5sf-k3.2
mutt 1.14.7 Potentially vulnerable mail phil@zankapfel.net
Entware
armv7sf-k2.6
mutt 1.14.7 Potentially vulnerable mail phil@zankapfel.net
Entware
armv7sf-k3.2
mutt 1.14.7 Potentially vulnerable mail phil@zankapfel.net
Exherbo
arbor
mail-client/mutt 1.14.7 Potentially vulnerable mail-client fallback-mnt-exherbo@repology
Fedora 26
updates
mutt 1.9.1 Potentially vulnerable Applications/Internet -
Fedora 26
release
mutt 1.8.2 Potentially vulnerable Applications/Internet -
Fedora 27
updates
mutt 1.9.2 Potentially vulnerable Applications/Internet -
Fedora 27
release
mutt 1.9.1 Potentially vulnerable Applications/Internet -
Fedora 28
updates
mutt 1.11.3 Potentially vulnerable Unspecified -
Fedora 28
release
mutt 1.9.3 Potentially vulnerable Applications/Internet -
Fedora 29
updates
mutt 1.12.1 Potentially vulnerable Unspecified -
Fedora 29
release
mutt 1.10.1 Potentially vulnerable Applications/Internet -
Fedora 30
updates
mutt 1.13.3 Potentially vulnerable Unspecified -
Fedora 30
release
mutt 1.11.4 Potentially vulnerable Unspecified -
Fedora 31
updates
mutt 1.14.6 Potentially vulnerable Unspecified -
Fedora 31
release
mutt 1.12.1 Potentially vulnerable Unspecified -
Fedora 32
updates
mutt 2.0.5 Potentially vulnerable Unspecified -
Fedora 32
release
mutt 1.13.4 Potentially vulnerable Unspecified -
Fedora 33
updates
mutt 2.0.5 Potentially vulnerable Unspecified -
Fedora 33
release
mutt 1.14.6 Potentially vulnerable Unspecified -
Fedora 34
updates
mutt 2.0.7 Unspecified -
Fedora 34
release
mutt 2.0.6 Potentially vulnerable Unspecified -
Fedora Rawhide mutt 2.1.1 Unspecified -
FreeBSD Ports mail/mutt 2.1.3 mail dereks@lifeofadishwasher.com
FreeBSD Ports japanese/mutt-devel 1.5.21.j1 Potentially vulnerable japanese st@be.to
Funtoo 1.4
net-kit
mail-client/mutt 1.12.1 Potentially vulnerable mail-client grobian@gentoo.org
Funtoo 1.4
net-kit
mail-client/mutt 1.12.0 Potentially vulnerable mail-client grobian@gentoo.org
Funtoo 1.4
net-kit
mail-client/mutt 1.11.4 Potentially vulnerable mail-client grobian@gentoo.org
Funtoo 1.4
net-kit
mail-client/mutt 1.11.3 Potentially vulnerable mail-client grobian@gentoo.org
Funtoo 1.4
net-kit
mail-client/mutt 1.10.1 Potentially vulnerable mail-client grobian@gentoo.org
Gentoo mail-client/mutt 2.1.2 mail-client grobian@gentoo.org
Gentoo mail-client/mutt 2.1.1 mail-client grobian@gentoo.org
Gentoo mail-client/mutt 2.0.7 mail-client grobian@gentoo.org
GNU Guix mutt 2.1.1 - -
GoboLinux Mutt 1.5.24 Potentially vulnerable - -
HaikuPorts master mail-client/mutt 1.14.6 Potentially vulnerable mail-client -
Homebrew mutt 2.1.3 - -
HP-UX 11.31
ia64_64
mutt 2.1.3 - -
HP-UX 11.31
hppa_32
mutt 1.14.7 Potentially vulnerable - -
HP-UX 11.31
ia64_64
mutt 1.14.7 Potentially vulnerable - -
HP-UX 11.31
hppa_32
mutt 1.8.3 Potentially vulnerable - -
HP-UX 11.31
ia64_32
mutt 1.8.3 Potentially vulnerable - -
HP-UX 11.31
hppa_32
mutt 1.5.21 Potentially vulnerable - -
Hyperbola
extra
mutt 1.10.1 Potentially vulnerable - -
Kali Linux Rolling
main
mutt 2.0.5 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org
LiGurOS stable mail-client/mutt 2.1.2 mail-client dev@liguros.net, grobian@gentoo.org
LiGurOS stable mail-client/mutt 2.1.1 mail-client dev@liguros.net, grobian@gentoo.org
LiGurOS develop mail-client/mutt 2.1.3 mail-client dev@liguros.net, grobian@gentoo.org
LiGurOS develop mail-client/mutt 2.1.2 mail-client dev@liguros.net, grobian@gentoo.org
Linuxbrew mutt 2.1.3 - -
MacPorts mutt 2.1.0 mail l2dy@macports, l2dy@github
Mageia 7
core/release
mutt 1.11.4 Potentially vulnerable Networking/Mail -
Mageia 7
core/updates
mutt 1.11.4 Potentially vulnerable Networking/Mail -
Mageia 7
core/updates
mutt 1.11.4 Potentially vulnerable Networking/Mail -
Mageia 7
core/updates
mutt 1.11.4 Potentially vulnerable Networking/Mail -
Mageia 7
core/updates
mutt 1.11.4 Potentially vulnerable Networking/Mail -
Mageia 8
core/release
mutt 2.0.5 Potentially vulnerable Networking/Mail -
Mageia Cauldron
core/release
mutt 2.1.3 Networking/Mail -
Manjaro Stable
extra
mutt 2.1.2 - -
Manjaro Testing
extra
mutt 2.1.3 - -
Manjaro Unstable
extra
mutt 2.1.3 - -
MidnightBSD mports mail/mutt 1.13.4 Potentially vulnerable mail -
MSYS2 msys2
x86_64
mutt 2.1.2 net-utils -
MSYS2 msys2
i686
mutt 2.1.0 net-utils -
MX Linux MX-15 Testing
test
mutt 1.8.0 Potentially vulnerable mail v3g4n@mxlinux.org, antonio@debian.org, paravoid@debian.org
MX Linux MX-19 Testing
test
mutt 2.0.2 Potentially vulnerable mail swamprabbit@mxlinux.org, antonio@debian.org, paravoid@debian.org
nixpkgs stable mutt 2.0.7 - rnhmjoj@inventati.org
nixpkgs stable mutt 2.0.7 - rnhmjoj@inventati.org
nixpkgs unstable mutt 2.1.2 - rnhmjoj@inventati.org
nixpkgs unstable mutt 2.1.2 - rnhmjoj@inventati.org
OpenBSD Ports mail/mutt 2.1.3 mail stu.ports@spacehopper.org
OpenBSD Ports mail/mutt 2.1.3 mail stu.ports@spacehopper.org
OpenBSD Ports mail/mutt 2.1.3 mail stu.ports@spacehopper.org
OpenBSD Ports mail/mutt 2.1.3 mail stu.ports@spacehopper.org
OpenBSD Ports mail/mutt 2.1.3 mail stu.ports@spacehopper.org
openEuler 20.03
source
mutt 1.10.1 Potentially vulnerable Unspecified -
OpenIndiana packages
hipster
mutt 2.1.2 Applications/Internet -
OpenIndiana packages
hipster
mutt 2.1.1 Applications/Internet -
OpenMandriva 4.0
main/release
mutt 1.11.4 Potentially vulnerable Networking/Mail bero@lindev.ch
OpenMandriva Cooker
main/release
mutt 1.11.4 Potentially vulnerable Networking/Mail bero@lindev.ch
OpenPKG mutt 2.1.3 Mail -
openSUSE Leap 42.3
updates/oss
mutt 1.10.1 Potentially vulnerable Productivity/Networking/Email/Clients -
openSUSE Leap 42.3
main/oss
mutt 1.8.2 Potentially vulnerable Productivity/Networking/Email/Clients -
openSUSE Leap 15.0
main/oss
mutt 1.9.1 Potentially vulnerable Productivity/Networking/Email/Clients -
openSUSE Leap 15.1
main/oss
mutt 1.10.1 Potentially vulnerable Productivity/Networking/Email/Clients -
openSUSE Leap 15.1
updates/oss
mutt 1.10.1 Potentially vulnerable Productivity/Networking/Email/Clients -
openSUSE Leap 15.1
updates/oss
mutt 1.10.1 Potentially vulnerable Productivity/Networking/Email/Clients -
openSUSE Leap 15.1
updates/oss
mutt 1.10.1 Potentially vulnerable Productivity/Networking/Email/Clients -
openSUSE Leap 15.1
updates/oss
mutt 1.10.1 Potentially vulnerable Productivity/Networking/Email/Clients -
openSUSE Leap 15.1
updates/oss
mutt 1.10.1 Potentially vulnerable Productivity/Networking/Email/Clients -
openSUSE Leap 15.2
main/oss
mutt 1.10.1 Potentially vulnerable Productivity/Networking/Email/Clients -
openSUSE Leap 15.2
updates/oss
mutt 1.10.1 Potentially vulnerable Productivity/Networking/Email/Clients -
openSUSE Leap 15.2
updates/oss
mutt 1.10.1 Potentially vulnerable Productivity/Networking/Email/Clients -
openSUSE Leap 15.2
updates/oss
mutt 1.10.1 Potentially vulnerable Productivity/Networking/Email/Clients -
openSUSE Leap 15.2
updates/oss
mutt 1.10.1 Potentially vulnerable Productivity/Networking/Email/Clients -
openSUSE Leap 15.2
updates/oss
mutt 1.10.1 Potentially vulnerable Productivity/Networking/Email/Clients -
openSUSE Leap 15.3
main/oss
mutt 1.10.1 Potentially vulnerable Productivity/Networking/Email/Clients -
openSUSE Tumbleweed
src-oss
mutt 2.0.7 Productivity/Networking/Email/Clients -
OpenWrt 17.01 x86_64
packages
mutt 1.7.2 Potentially vulnerable mail phil@zankapfel.net
OpenWrt 18.06 x86_64
packages
mutt 1.9.4 Potentially vulnerable mail phil@zankapfel.net
OpenWrt 19.07 x86_64
packages
mutt 1.12.0 Potentially vulnerable mail phil@zankapfel.net
OpenWrt 21.02 x86_64
packages
mutt 1.14.7 Potentially vulnerable mail phil@zankapfel.net
Parabola
extra
mutt 2.1.3 - -
Pardus 17
updates/main
mutt 1.7.2 Potentially vulnerable mail pkg-mutt-maintainers@lists.alioth.debian.org, antonio@debian.org, paravoid@debian.org
Pardus 17
main
mutt 1.7.2 Potentially vulnerable mail pkg-mutt-maintainers@lists.alioth.debian.org, antonio@debian.org, paravoid@debian.org
Pardus 19
main
mutt 1.10.1 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org, paravoid@debian.org
Pardus 19
updates/main
mutt 1.10.1 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org, paravoid@debian.org
Pardus 21
main
mutt 2.0.5 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org
Parrot
main
mutt 2.0.5 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org
PCLinuxOS mutt 1.5.21 Potentially vulnerable Networking/Mail -
pkgsrc current mail/mutt 2.1.3 mail tonio@netbsd.org
PLD Linux mutt 2.0.7 - -
PureOS Amber mutt 1.10.1 Potentially vulnerable misc mutt@packages.debian.org, antonio@debian.org, paravoid@debian.org
PureOS landing mutt 2.0.5 Potentially vulnerable misc mutt@packages.debian.org, antonio@debian.org
Raspbian Oldstable
main
mutt 1.10.1 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org, paravoid@debian.org
Raspbian Stable
main
mutt 2.0.5 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org
Raspbian Testing
main
mutt 2.0.5 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org
Ravenports mutt 2.1.3 mail goleo@disroot.org
Rocky Linux 8
AppStream
mutt 1.10.1 Potentially vulnerable Applications/Internet infrastructure@rockylinux.org
Rosa 2014.1
main/release
mutt 1.5.23 Potentially vulnerable - -
Rosa 2014.1
contrib/updates
mutt 1.5.23 Potentially vulnerable - -
Rosa 2016.1
contrib/release
mutt 1.5.23 Potentially vulnerable - -
Rosa 2019.1
contrib/release
mutt 2.0.7 Networking/Mail m.novosyolov@rosalinux.ru
Rosa Server 6.9
base/release
mutt 1.5.20 Potentially vulnerable Applications/Internet andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
mutt 1.5.20 Potentially vulnerable Applications/Internet andrew.lukoshko@rosalab.ru
Rosa Server 7.3
base/release
mutt 1.5.21 Potentially vulnerable Applications/Internet alex2048@mail.ru
Rosa Server 7.5
base/release
mutt 1.5.21 Potentially vulnerable Applications/Internet alex2048@mail.ru
Rosa Server 7.5
base/release
mutt 1.5.21 Potentially vulnerable Applications/Internet alex2048@mail.ru
Scientific Linux 7.x mutt 1.5.21 Potentially vulnerable Applications/Internet -
Scientific Linux 7.x mutt 1.5.21 Potentially vulnerable Applications/Internet -
Scientific Linux 7.x mutt 1.5.21 Potentially vulnerable Applications/Internet -
Scientific Linux 7.x mutt 1.5.21 Potentially vulnerable Applications/Internet -
Scientific Linux 7.x mutt 1.5.21 Potentially vulnerable Applications/Internet -
Slackware 14.2
patches
mutt 1.10.1 Potentially vulnerable - volkerdi@slackware.com
Slackware 14.2
slackware
mutt 1.6.1 Potentially vulnerable - volkerdi@slackware.com
Slackware current
slackware
mutt 2.1.3 - volkerdi@slackware.com
Slackware64 14.2
patches
mutt 1.10.1 Potentially vulnerable - volkerdi@slackware.com
Slackware64 14.2
slackware64
mutt 1.6.1 Potentially vulnerable - volkerdi@slackware.com
Slackware64 current
slackware64
mutt 2.1.3 - volkerdi@slackware.com
Slackwarearm 14.2
patches
mutt 1.10.1 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 14.2
slackware
mutt 1.6.1 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm current
slackware
mutt 2.1.3 - volkerdi@slackware.com
SliTaz Cooking mutt 1.13.4 Potentially vulnerable network paul@slitaz.org
SliTaz Next mutt 1.10.0 Potentially vulnerable network paul@slitaz.org
Solus mutt 2.1.0 network.mail joshua@streambits.io
Solus mutt-dbginfo 2.1.0 debug joshua@streambits.io
T2 SDE mutt 2.0.5 Potentially vulnerable extra/network rene@t2-project.org
Termux mutt 2.1.1 - termux@termux
Trisquel 6.0
toutatis/main
mutt 1.5.21 Potentially vulnerable mail ubuntu-devel-discuss@lists.ubuntu.com, myon@debian.org
Trisquel 6.0
toutatis-updates/main
mutt 1.5.21 Potentially vulnerable mail ubuntu-devel-discuss@lists.ubuntu.com, myon@debian.org
Trisquel 7.0
belenos/main
mutt 1.5.21 Potentially vulnerable mail ubuntu-devel-discuss@lists.ubuntu.com, myon@debian.org
Trisquel 7.0
belenos-updates/main
mutt 1.5.21 Potentially vulnerable mail ubuntu-devel-discuss@lists.ubuntu.com, myon@debian.org
Trisquel 8.0
flidas/main
mutt 1.5.24 Potentially vulnerable mail antonio@dyne.org, myon@debian.org
Trisquel 8.0
flidas-updates/main
mutt 1.5.24 Potentially vulnerable mail ubuntu-devel-discuss@lists.ubuntu.com, myon@debian.org
Trisquel 9.0
etiona-updates/main
mutt 1.9.4 Potentially vulnerable mail ubuntu-devel-discuss@lists.ubuntu.com, antonio@debian.org, paravoid@debian.org
Trisquel 9.0
etiona/main
mutt 1.9.4 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org, paravoid@debian.org
Ubuntu 14.04
trusty/main
mutt 1.5.21 Potentially vulnerable mail ubuntu-devel-discuss@lists.ubuntu.com, myon@debian.org
Ubuntu 14.04
trusty-updates/main
mutt 1.5.21 Potentially vulnerable mail ubuntu-devel-discuss@lists.ubuntu.com, myon@debian.org
Ubuntu 16.04
xenial-updates/main
mutt 1.5.24 Potentially vulnerable mail ubuntu-devel-discuss@lists.ubuntu.com, myon@debian.org
Ubuntu 16.04
xenial/main
mutt 1.5.24 Potentially vulnerable mail antonio@dyne.org, myon@debian.org
Ubuntu 18.04
bionic/main
mutt 1.9.4 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org, paravoid@debian.org
Ubuntu 18.04
bionic-updates/main
mutt 1.9.4 Potentially vulnerable mail ubuntu-devel-discuss@lists.ubuntu.com, antonio@debian.org, paravoid@debian.org
Ubuntu 20.04
focal/main
mutt 1.13.2 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org, paravoid@debian.org
Ubuntu 20.04
focal-updates/main
mutt 1.13.2 Potentially vulnerable mail ubuntu-devel-discuss@lists.ubuntu.com, antonio@debian.org, paravoid@debian.org
Ubuntu 20.10
groovy/main
mutt 1.14.6 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org, paravoid@debian.org
Ubuntu 20.10
groovy-updates/main
mutt 1.14.6 Potentially vulnerable mail ubuntu-devel-discuss@lists.ubuntu.com, antonio@debian.org, paravoid@debian.org
Ubuntu 21.04
hirsute/main
mutt 2.0.5 Potentially vulnerable mail mutt@packages.debian.org, antonio@debian.org
Void Linux x86_64
x86_64
mutt 2.1.3 - congdanhqx@gmail.com
Wikidata Mutt 2.1.3 - -