Versions Packages Information History CVEs Related Badges Report

Versions for screen

265 package(s) known

Repository Package name Version Category Maintainer(s)
Adélie Linux current
user
screen 4.8.0 Potentially vulnerable - djt@hxx.in
Adélie Linux current
user
screen-dbg 4.8.0 Potentially vulnerable - djt@hxx.in
Adélie Linux current
user
screen-doc 4.8.0 Potentially vulnerable - djt@hxx.in
AIX Open Source Packages screen 4.8.0 Potentially vulnerable - -
AIX Open Source Packages screen 4.7.0 Potentially vulnerable - -
AIX Open Source Packages screen 4.6.2 Potentially vulnerable - -
AIX Open Source Packages screen 4.6.1 Potentially vulnerable - -
AIX Open Source Packages screen 4.6.0 Potentially vulnerable - -
AIX Open Source Packages screen 4.5.1 Potentially vulnerable - -
AIX Open Source Packages screen 4.5.0 Potentially vulnerable - -
AIX Open Source Packages screen 4.4.0 Potentially vulnerable - -
AIX Open Source Packages screen 4.3.1 Potentially vulnerable - -
AIX Open Source Packages screen 4.3.0 Potentially vulnerable - -
AIX Open Source Packages screen 4.2.1 Potentially vulnerable - -
AIX Open Source Packages screen 4.2.1 Potentially vulnerable - -
AIX Open Source Packages screen 4.0.3 Potentially vulnerable - -
AIX Toolbox screen 4.7.0 Potentially vulnerable Applications/System -
AIX Toolbox screen 4.6.2 Potentially vulnerable Applications/System -
Alpine Linux 3.8
main
screen-doc 4.6.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
screen 4.6.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
screen 4.6.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
screen-doc 4.6.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
screen 4.6.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
screen-doc 4.6.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
screen-doc 4.7.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
screen 4.7.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
screen 4.8.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
screen-doc 4.8.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
screen-doc 4.8.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
screen 4.8.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
screen-doc 4.8.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
screen 4.8.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
screen-doc 4.8.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
screen 4.8.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
screen 4.9.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
screen-doc 4.9.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
main
screen-doc 4.9.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
main
screen 4.9.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.18
main
screen 4.9.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.18
main
screen-doc 4.9.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
screen 4.9.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
screen-doc 4.9.0 Potentially vulnerable - ncopa@alpinelinux.org
ALT Linux p9 screen 4.6.2 Potentially vulnerable Terminals glebfm@altlinux.org
ALT Linux p10 screen 4.8.0 Potentially vulnerable Terminals vseleznv@altlinux.org
ALT Sisyphus screen 4.8.0 Potentially vulnerable Terminals vseleznv@altlinux.org
Amazon Linux 1
updates
screen 4.0.3 Potentially vulnerable Applications/System -
Amazon Linux 1
main
screen 4.0.3 Potentially vulnerable Applications/System -
Amazon Linux 2 screen 4.1.0 Potentially vulnerable Applications/System -
Amazon Linux 2 screen 4.1.0 Potentially vulnerable Applications/System -
Amazon Linux 2 screen 4.1.0 Potentially vulnerable Applications/System -
Amazon Linux 2 screen 4.1.0 Potentially vulnerable Applications/System -
AOSC screen 4.9.0 Potentially vulnerable utils fallback-mnt-aosc@repology
Apertis v2020
v2020/development
screen 4.6.2 Potentially vulnerable main abe@debian.org, antti.jarvinen@katiska.org
Apertis v2021
v2021/development
screen 4.6.2 Potentially vulnerable main abe@debian.org, antti.jarvinen@katiska.org
Apertis v2022
v2022/development
screen 4.8.0 Potentially vulnerable main abe@debian.org, antti.jarvinen@katiska.org
Apertis v2023
v2023/development
screen 4.8.0 Potentially vulnerable - abe@debian.org, antti.jarvinen@katiska.org
Apertis v2024 Development
v2024dev1/development
screen 4.8.0 Potentially vulnerable - abe@debian.org, antti.jarvinen@katiska.org
Arch
extra
screen 4.9.0 Potentially vulnerable - -
Arch Linux 32 i486
community
screen 4.9.0 Potentially vulnerable - -
Arch Linux 32 i686
community
screen 4.9.0 Potentially vulnerable - -
Arch Linux 32 pentium4
community
screen 4.9.0 Potentially vulnerable - -
Arch Linux ARM aarch64
community
screen 4.9.0 Potentially vulnerable - -
Arch Linux ARM armv7h
community
screen 4.9.0 Potentially vulnerable - -
ArchPOWER powerpc screen 4.9.0 Potentially vulnerable - -
ArchPOWER powerpc64le screen 4.9.0 Potentially vulnerable - -
ArchPOWER riscv64 screen 4.9.0 Potentially vulnerable - -
AUR screen-git v.4.2.1.580.gfbee2ab - alyptik@aur
Artix
galaxy
screen 4.9.0 Potentially vulnerable - -
Ataraxia GNU/Linux screen 4.8.0 Potentially vulnerable admin nagakamira@gmail.com
CentOS 6
os
screen 4.0.3 Potentially vulnerable Applications/System -
CentOS 7
os
screen 4.1.0 Potentially vulnerable Applications/System -
CentOS 7
updates
screen 4.1.0 Potentially vulnerable Applications/System -
CRUX 3.4
opt
screen 4.6.2 Potentially vulnerable - jue@crux.nu
CRUX 3.5
opt
screen 4.8.0 Potentially vulnerable - jue@crux.nu
CRUX 3.6
opt
screen 4.9.0 Potentially vulnerable - jue@crux.nu
CRUX 3.7
opt
screen 4.9.0 Potentially vulnerable - jue@crux.nu
Cygwin screen 4.9.0 Potentially vulnerable Utils andrew.schulman@cygwin
Cygwin screen-debuginfo 4.9.0 Potentially vulnerable Debug andrew.schulman@cygwin
Debian 10
buster/main
screen 4.6.2 Potentially vulnerable misc abe@debian.org, antti.jarvinen@katiska.org
Debian 10
buster/updates/main
screen 4.6.2 Potentially vulnerable misc abe@debian.org, antti.jarvinen@katiska.org
Debian 11
bullseye/main
screen 4.8.0 Potentially vulnerable misc abe@debian.org, antti.jarvinen@katiska.org
Debian 12
bookworm/main
screen 4.9.0 Potentially vulnerable misc abe@debian.org, antti.jarvinen@katiska.org
Debian Unstable
sid/main
screen 4.9.0 Potentially vulnerable misc abe@debian.org, antti.jarvinen@katiska.org
Deepin
main
screen 4.6.2 Potentially vulnerable - abe@debian.org, antti.jarvinen@katiska.org
Devuan 3.0
beowulf/main
screen 4.6.2 Potentially vulnerable misc abe@debian.org, antti.jarvinen@katiska.org
Devuan 4.0
chimaera/main
screen 4.8.0 Potentially vulnerable misc abe@debian.org, antti.jarvinen@katiska.org
Devuan Unstable
unstable/main
screen 4.9.0 Potentially vulnerable misc abe@debian.org, antti.jarvinen@katiska.org
distri screen 4.8.0 Potentially vulnerable - -
DistroWatch.com screen 4.9.0 Potentially vulnerable - -
DPorts sysutils/screen 4.9.0 Potentially vulnerable sysutils cy@freebsd.org
Entware
armv7sf-k3.2
screen 4.8.0 Potentially vulnerable utils champetier.etienne@gmail.com
Entware
mipselsf-k3.4
screen 4.8.0 Potentially vulnerable utils champetier.etienne@gmail.com
Entware
mipssf-k3.4
screen 4.8.0 Potentially vulnerable utils champetier.etienne@gmail.com
Entware
x64-k3.2
screen 4.8.0 Potentially vulnerable utils champetier.etienne@gmail.com
Entware
aarch64-k3.10
screen 4.8.0 Potentially vulnerable utils champetier.etienne@gmail.com
Entware
armv5sf-k3.2
screen 4.8.0 Potentially vulnerable utils champetier.etienne@gmail.com
Entware
armv7sf-k2.6
screen 4.8.0 Potentially vulnerable utils champetier.etienne@gmail.com
EPEL 8 screen 4.6.2 Potentially vulnerable Unspecified -
EPEL 9 screen 4.8.0 Potentially vulnerable Unspecified -
Exherbo
arbor
app-misc/screen scm app-misc fallback-mnt-exherbo@repology
Exherbo
arbor
app-misc/screen 4.9.0 Potentially vulnerable app-misc fallback-mnt-exherbo@repology
Fedora 26
updates
screen 4.6.2 Potentially vulnerable Unspecified -
Fedora 26
release
screen 4.5.1 Potentially vulnerable Applications/System -
Fedora 27
updates
screen 4.6.2 Potentially vulnerable Unspecified -
Fedora 27
release
screen 4.6.1 Potentially vulnerable Applications/System -
Fedora 28
release
screen 4.6.2 Potentially vulnerable Unspecified -
Fedora 29
release
screen 4.6.2 Potentially vulnerable Unspecified -
Fedora 30
release
screen 4.6.2 Potentially vulnerable Unspecified -
Fedora 31
release
screen 4.6.2 Potentially vulnerable Unspecified -
Fedora 32
release
screen 4.8.0 Potentially vulnerable Unspecified -
Fedora 32
updates
screen 4.8.0 Potentially vulnerable Unspecified -
Fedora 33
updates
screen 4.8.0 Potentially vulnerable Unspecified -
Fedora 33
release
screen 4.8.0 Potentially vulnerable Unspecified -
Fedora 34
release
screen 4.8.0 Potentially vulnerable Unspecified -
Fedora 35
updates
screen 4.9.0 Potentially vulnerable Unspecified -
Fedora 35
release
screen 4.8.0 Potentially vulnerable Unspecified -
Fedora 36
release
screen 4.9.0 Potentially vulnerable Unspecified -
Fedora 37
release
screen 4.9.0 Potentially vulnerable Unspecified -
Fedora 38
release
screen 4.9.0 Potentially vulnerable Unspecified -
Fedora Rawhide
development
screen 4.9.0 Potentially vulnerable Unspecified -
FreeBSD Ports sysutils/screen 4.9.0 Potentially vulnerable sysutils cy@freebsd.org
Gentoo app-misc/screen 9999 app-misc swegener@gentoo.org, shell-tools@gentoo.org
Gentoo app-misc/screen 4.9.0 Potentially vulnerable app-misc swegener@gentoo.org, shell-tools@gentoo.org
Gentoo app-misc/screen 4.9.0 Potentially vulnerable app-misc swegener@gentoo.org, shell-tools@gentoo.org
GNU Guix screen 4.9.0 Potentially vulnerable - -
GoboLinux Screen 4.5.1 Potentially vulnerable - -
HaikuPorts master app-misc/screen 4.99.0~git app-misc -
HaikuPorts master app-misc/screen 4.6.1 Potentially vulnerable app-misc -
Homebrew screen 4.9.0 Potentially vulnerable - -
HP-UX 11.31
ia64_64
screen 4.9.0 Potentially vulnerable - -
HP-UX 11.31
hppa_32
screen 4.8.0 Potentially vulnerable - -
HP-UX 11.31
ia64_64
screen 4.8.0 Potentially vulnerable - -
HP-UX 11.31
hppa_32
screen 4.6.1 Potentially vulnerable - -
HP-UX 11.31
ia64_32
screen 4.6.1 Potentially vulnerable - -
HP-UX 11.31
hppa_32
screen 4.0.3 Potentially vulnerable - -
Kali Linux Rolling
main
screen 4.9.0 Potentially vulnerable misc abe@debian.org, antti.jarvinen@katiska.org
LiGurOS stable app-misc/screen 9999 app-misc swegener@gentoo.org, shell-tools@gentoo.org
LiGurOS stable app-misc/screen 4.9.0 Potentially vulnerable app-misc swegener@gentoo.org, shell-tools@gentoo.org
LiGurOS stable app-misc/screen 4.9.0 Potentially vulnerable app-misc swegener@gentoo.org, shell-tools@gentoo.org
LiGurOS develop app-misc/screen 9999 app-misc swegener@gentoo.org, shell-tools@gentoo.org
LiGurOS develop app-misc/screen 4.9.0 Potentially vulnerable app-misc swegener@gentoo.org, shell-tools@gentoo.org
LiGurOS develop app-misc/screen 4.9.0 Potentially vulnerable app-misc swegener@gentoo.org, shell-tools@gentoo.org
MacPorts screen 4.9.0 Potentially vulnerable sysutils dgilman@github
Mageia 7
core/release
screen 4.6.2 Potentially vulnerable Terminals -
Mageia 7
core/updates
screen 4.6.2 Potentially vulnerable Terminals -
Mageia 8
core/release
screen 4.8.0 Potentially vulnerable Terminals -
Mageia 8
core/updates
screen 4.8.0 Potentially vulnerable Terminals -
Mageia Cauldron
core/release
screen 4.9.0 Potentially vulnerable Terminals -
Manjaro Stable
community
screen 4.9.0 Potentially vulnerable - -
Manjaro Testing
community
screen 4.9.0 Potentially vulnerable - -
Manjaro Unstable
extra
screen 4.9.0 Potentially vulnerable - -
MidnightBSD mports sysutils/screen 4.9.0 Potentially vulnerable sysutils -
nixpkgs stable 21.11 screen 4.8.0 Potentially vulnerable - rahul@gopinath.org
nixpkgs stable 22.05 screen 4.9.0 Potentially vulnerable - rahul@gopinath.org
nixpkgs stable 22.11 screen 4.9.0 Potentially vulnerable - rahul@gopinath.org
nixpkgs unstable screen 4.9.0 Potentially vulnerable - rahul@gopinath.org
OpenBSD Ports misc/screen 4.9.0 Potentially vulnerable misc ports@openbsd.org
OpenBSD Ports misc/screen-shm 4.0.3 Potentially vulnerable misc ports@openbsd.org
OpenBSD Ports misc/screen-shm 4.0.3 Potentially vulnerable misc ports@openbsd.org
openEuler 20.03
source
screen 4.6.2 Potentially vulnerable Unspecified -
openEuler 22.03
source
screen 4.8.0 Potentially vulnerable Unspecified -
OpenIndiana packages
hipster
screen 4.9.0 Potentially vulnerable Applications/System Utilities -
openmamba
devel
screen 4.8.0 Potentially vulnerable Applications/Shells silvan.calarco@mambasoft.it
OpenMandriva 4.0
main/release
screen 4.6.2 Potentially vulnerable Terminals bero@lindev.ch
OpenMandriva 4.1
main/release
screen 4.7.0 Potentially vulnerable Terminals bero@lindev.ch
OpenMandriva 4.2
main/release
screen 4.8.0 Potentially vulnerable Terminals bero@lindev.ch
OpenMandriva 4.3
main/release
screen 4.9.0 Potentially vulnerable Terminals bero@lindev.ch
OpenMandriva 4.3
main/release
screen 4.8.0 Potentially vulnerable Terminals bero+massbuild@lindev.ch
OpenMandriva Rolling
main/release
screen 4.9.0 Potentially vulnerable Terminals bero@lindev.ch
OpenMandriva Cooker
main/release
screen 4.9.0 Potentially vulnerable Terminals bero@lindev.ch
OpenPKG screen 4.6.2 Potentially vulnerable Terminal -
openSUSE Leap 42.3
updates/oss
screen 4.0.4 Potentially vulnerable System/Console -
openSUSE Leap 42.3
main/oss
screen 4.0.4 Potentially vulnerable System/Console -
openSUSE Leap 15.0
main/oss
screen 4.6.2 Potentially vulnerable System/Console -
openSUSE Leap 15.1
main/oss
screen 4.6.2 Potentially vulnerable System/Console -
openSUSE Leap 15.2
main/oss
screen 4.6.2 Potentially vulnerable System/Console -
openSUSE Leap 15.2
updates/oss
screen 4.6.2 Potentially vulnerable System/Console -
openSUSE Leap 15.3
main/oss
screen 4.6.2 Potentially vulnerable System/Console -
openSUSE Leap 15.4
main/oss
screen 4.6.2 Potentially vulnerable System/Console -
openSUSE Leap 15.5
main/oss
screen 4.6.2 Potentially vulnerable System/Console -
openSUSE Tumbleweed
src-oss
screen 4.9.0 Potentially vulnerable System/Console -
OpenWrt 17.01 x86_64
packages
screen 4.3.1 Potentially vulnerable utils champetier.etienne@gmail.com
OpenWrt 18.06 x86_64
packages
screen 4.6.2 Potentially vulnerable utils champetier.etienne@gmail.com
OpenWrt 19.07 x86_64
packages
screen 4.8.0 Potentially vulnerable utils champetier.etienne@gmail.com
OpenWrt 21.02 x86_64
packages
screen 4.8.0 Potentially vulnerable utils champetier.etienne@gmail.com
OpenWrt 22.03 x86_64
packages
screen 4.8.0 Potentially vulnerable utils champetier.etienne@gmail.com
Parabola
extra
screen 4.9.0 Potentially vulnerable - -
Pardus 21
main
screen 4.8.0 Potentially vulnerable misc abe@debian.org, antti.jarvinen@katiska.org
Parrot
parrot-updates/main
screen 4.8.0 Potentially vulnerable misc abe@debian.org, antti.jarvinen@katiska.org
Parrot
parrot/main
screen 4.8.0 Potentially vulnerable misc abe@debian.org, antti.jarvinen@katiska.org
PCLinuxOS screen 4.0.3 Potentially vulnerable Terminals -
Pisi Linux
main
screen 4.6.2 Potentially vulnerable app:console admins@pisilinux.org
pkgsrc current misc/screen 4.9.0 Potentially vulnerable misc pkgsrc-users@netbsd.org
PLD Linux screen 4.9.0 Potentially vulnerable - -
PureOS Amber screen 4.6.2 Potentially vulnerable misc abe@debian.org, antti.jarvinen@katiska.org
PureOS Amber screen 4.6.2 Potentially vulnerable misc abe@debian.org, antti.jarvinen@katiska.org
PureOS landing screen 4.8.0 Potentially vulnerable misc abe@debian.org, antti.jarvinen@katiska.org
Raspbian Oldstable
main
screen 4.6.2 Potentially vulnerable misc abe@debian.org, antti.jarvinen@katiska.org
Raspbian Stable
main
screen 4.8.0 Potentially vulnerable misc abe@debian.org, antti.jarvinen@katiska.org
Raspbian Testing
main
screen 4.9.0 Potentially vulnerable misc abe@debian.org, antti.jarvinen@katiska.org
Ravenports screen 4.9.0 Potentially vulnerable sysutils fallback-mnt-ravenports@repology
Rosa 2014.1
main/updates
screen 4.3.1 Potentially vulnerable - -
Rosa 2014.1
main/release
screen 4.0.3 Potentially vulnerable - -
Rosa 2016.1
main/release
screen 4.5.0 Potentially vulnerable - -
Rosa 2021.1
main/release
screen 4.9.0 Potentially vulnerable Terminals victorr2007@yandex.ru
Rosa Server 6.9
base/release
screen 4.0.3 Potentially vulnerable Applications/System andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
screen 4.0.3 Potentially vulnerable Applications/System andrew.lukoshko@rosalab.ru
Rosa Server 7.3
base/release
screen 4.1.0 Potentially vulnerable Applications/System alex2048@mail.ru
Rosa Server 7.5
base/release
screen 4.1.0 Potentially vulnerable Applications/System alex2048@mail.ru
Rosa Server 7.5
base/release
screen 4.1.0 Potentially vulnerable Applications/System alex2048@mail.ru
Scientific Linux 7.x screen 4.1.0 Potentially vulnerable Applications/System -
Scientific Linux 7.x screen 4.1.0 Potentially vulnerable Applications/System -
Scientific Linux 7.x screen 4.1.0 Potentially vulnerable Applications/System -
Scientific Linux 7.x screen 4.1.0 Potentially vulnerable Applications/System -
Scientific Linux 7.x screen 4.1.0 Potentially vulnerable Applications/System -
Scientific Linux 7.x screen 4.1.0 Potentially vulnerable Applications/System -
Scientific Linux 7.x screen 4.1.0 Potentially vulnerable Applications/System -
Scientific Linux 7.x screen 4.1.0 Potentially vulnerable Applications/System -
Slackware 14.2
patches
screen 4.4.0 Potentially vulnerable - volkerdi@slackware.com
Slackware 14.2
slackware
screen 4.4.0 Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
slackware
screen 4.9.0 Potentially vulnerable - volkerdi@slackware.com
Slackware current
slackware
screen 4.9.0 Potentially vulnerable - volkerdi@slackware.com
Slackware64 14.2
slackware64
screen 4.4.0 Potentially vulnerable - volkerdi@slackware.com
Slackware64 14.2
patches
screen 4.4.0 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
slackware64
screen 4.9.0 Potentially vulnerable - volkerdi@slackware.com
Slackware64 current
slackware64
screen 4.9.0 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 14.2
slackware
screen 4.4.0 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 14.2
patches
screen 4.4.0 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 15.0
slackware
screen 4.9.0 Potentially vulnerable - volkerdi@slackware.com
SliTaz Cooking screen 4.9.0 Potentially vulnerable system-tools pascal.bellard@slitaz.org
SliTaz Cooking screen-terminfo 4.9.0 Potentially vulnerable system-tools pascal.bellard@slitaz.org
SliTaz Cooking screen-pam 4.9.0 Potentially vulnerable system-tools pascal.bellard@slitaz.org
SliTaz Next screen-terminfo 4.6.2 Potentially vulnerable system-tools pascal.bellard@slitaz.org
SliTaz Next screen 4.6.2 Potentially vulnerable system-tools pascal.bellard@slitaz.org
SliTaz Next screen-pam 4.6.2 Potentially vulnerable system-tools pascal.bellard@slitaz.org
SliTaz Next screen-terminfo 4.6.2 Potentially vulnerable system-tools pascal.bellard@slitaz.org
SliTaz Next screen 4.6.2 Potentially vulnerable system-tools pascal.bellard@slitaz.org
SliTaz Next screen-pam 4.6.2 Potentially vulnerable system-tools pascal.bellard@slitaz.org
Solus screen 4.9.0 Potentially vulnerable system.utils josephriches@gmail.com
Solus screen-dbginfo 4.9.0 Potentially vulnerable debug josephriches@gmail.com
Spack screen 4.9.0 Potentially vulnerable - fallback-mnt-spack@repology
T2 SDE screen 4.8.0 Potentially vulnerable base/tool rene@t2-project.org
Termux screen 4.9.0 Potentially vulnerable - termux@github
Trisquel 9.0
etiona-updates/main
screen 4.6.2 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, antti.jarvinen@katiska.org
Trisquel 9.0
etiona-security/main
screen 4.6.2 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, antti.jarvinen@katiska.org
Trisquel 9.0
etiona/main
screen 4.6.2 Potentially vulnerable misc abe@debian.org, antti.jarvinen@katiska.org
Trisquel 10.0
nabia/main
screen 4.8.0 Potentially vulnerable misc abe@debian.org, antti.jarvinen@katiska.org
Trisquel 10.0
nabia-updates/main
screen 4.8.0 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, antti.jarvinen@katiska.org
Trisquel 10.0
nabia-security/main
screen 4.8.0 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, antti.jarvinen@katiska.org
Trisquel 11.0
aramo-updates/main
screen 4.9.0 Potentially vulnerable misc trisquel-devel@listas.trisquel.info, antti.jarvinen@katiska.org
Trisquel 11.0
aramo/main
screen 4.9.0 Potentially vulnerable misc trisquel-devel@listas.trisquel.info, antti.jarvinen@katiska.org
Ubuntu 14.04
trusty/main
screen 4.1.0~20120320gitdb59704 Potentially vulnerable misc abe@debian.org, hesso@pool.math.tu-berlin.de
Ubuntu 14.04 Backports
trusty-backports/main
screen 4.2.1 Potentially vulnerable misc abe@debian.org, hesso@pool.math.tu-berlin.de
Ubuntu 16.04
xenial-updates/main
screen 4.3.1 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 16.04
xenial/main
screen 4.3.1 Potentially vulnerable misc abe@debian.org
Ubuntu 18.04
bionic/main
screen 4.6.2 Potentially vulnerable misc abe@debian.org, antti.jarvinen@katiska.org
Ubuntu 18.04
bionic-updates/main
screen 4.6.2 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, antti.jarvinen@katiska.org
Ubuntu 20.04
focal/main
screen 4.8.0 Potentially vulnerable misc abe@debian.org, antti.jarvinen@katiska.org
Ubuntu 20.04
focal-updates/main
screen 4.8.0 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, antti.jarvinen@katiska.org
Ubuntu 22.04
jammy/main
screen 4.9.0 Potentially vulnerable misc abe@debian.org, antti.jarvinen@katiska.org
Ubuntu 22.10
kinetic/main
screen 4.9.0 Potentially vulnerable misc abe@debian.org, antti.jarvinen@katiska.org
Ubuntu 23.04
lunar/main
screen 4.9.0 Potentially vulnerable misc abe@debian.org, antti.jarvinen@katiska.org
Void Linux x86_64
x86_64
screen 4.9.0 Potentially vulnerable - steinex@nognu.de
Wikidata GNU Screen 4.9.0 Potentially vulnerable - -
yiffOS Knot screen 4.9.0 Potentially vulnerable - fekhesk@pm.me