Versions Packages Information History CVEs Related Badges Report

Versions for sylpheed

163 package(s) known

Repository Package name Version Category Maintainer(s)
Alpine Linux 3.15
community
sylpheed 3.7.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
community
sylpheed-lang 3.7.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
community
sylpheed-dev 3.7.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
community
sylpheed-dev 3.7.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
community
sylpheed-lang 3.7.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
community
sylpheed 3.7.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
community
sylpheed-lang 3.7.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
community
sylpheed 3.7.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
community
sylpheed-dev 3.7.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.18
community
sylpheed 3.7.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.18
community
sylpheed-dev 3.7.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.18
community
sylpheed-lang 3.7.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.19
community
sylpheed 3.7.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.19
community
sylpheed-dev 3.7.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.19
community
sylpheed-lang 3.7.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.20
community
sylpheed 3.7.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.20
community
sylpheed-dev 3.7.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.20
community
sylpheed-lang 3.7.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.21
community
sylpheed 3.7.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.21
community
sylpheed-dev 3.7.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.21
community
sylpheed-lang 3.7.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.22
community
sylpheed 3.7.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.22
community
sylpheed-dev 3.7.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.22
community
sylpheed-lang 3.7.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
sylpheed 3.7.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
sylpheed-dev 3.7.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
sylpheed-lang 3.7.0 Potentially vulnerable - ncopa@alpinelinux.org
ALT Linux p9 sylpheed 3.7.0 Potentially vulnerable Networking/Mail oddity@altlinux.ru
ALT Linux p10 sylpheed 3.7.0 Potentially vulnerable Networking/Mail oddity@altlinux.ru
ALT Linux p11 sylpheed 3.7.0 Potentially vulnerable Networking/Mail oddity@altlinux.ru
ALT Sisyphus sylpheed 3.7.0 Potentially vulnerable Networking/Mail oddity@altlinux.ru
AUR sylpheed-lite 3.8.0beta1 - trialnerror@aur
Chocolatey Sylpheed (Install) 3.7.0 Potentially vulnerable - -
Chocolatey Sylpheed (Portable) 3.7.0 Potentially vulnerable - -
CRUX 3.6
opt
sylpheed 3.7.0 Potentially vulnerable - jue@crux.nu
CRUX 3.7
opt
sylpheed 3.8.0beta1 - jue@crux.nu
CRUX 3.8
opt
sylpheed 3.8.0beta1 - jue@crux.nu
Debian 10
buster/main
sylpheed 3.7.0 Potentially vulnerable mail mones@debian.org, hayashi@clear-code.com, henrich@debian.org
Debian 11
bullseye/main
sylpheed 3.7.0 Potentially vulnerable mail mones@debian.org, hayashi@clear-code.com, henrich@debian.org
Debian 12
bookworm/main
sylpheed 3.8.0~beta1 mail mones@debian.org, hayashi@clear-code.com, henrich@debian.org
Debian 13
trixie/main
sylpheed 3.8.0~beta1 mail mones@debian.org, hayashi@clear-code.com, henrich@debian.org
Debian Unstable
sid/main
sylpheed 3.8.0~beta1 mail mones@debian.org, hayashi@clear-code.com, henrich@debian.org
deepin 20
main
sylpheed 3.7.0 Potentially vulnerable - mones@debian.org, hayashi@clear-code.com, henrich@debian.org
Devuan 3.0
beowulf/main
sylpheed 3.7.0 Potentially vulnerable mail mones@debian.org, hayashi@clear-code.com, henrich@debian.org
Devuan 4.0
chimaera/main
sylpheed 3.7.0 Potentially vulnerable mail mones@debian.org, hayashi@clear-code.com, henrich@debian.org
Devuan Unstable
unstable/main
sylpheed 3.8.0~beta1 mail mones@debian.org, hayashi@clear-code.com, henrich@debian.org
EPEL 7 sylpheed 3.4.3 Potentially vulnerable Applications/Internet -
Fedora 37
release
sylpheed 3.7.0 Potentially vulnerable Unspecified -
Fedora 38
release
sylpheed 3.7.0 Potentially vulnerable Unspecified -
Fedora 39
release
sylpheed 3.7.0 Potentially vulnerable Unspecified -
Fedora 40
release
sylpheed 3.7.0 Potentially vulnerable Unspecified -
Fedora 41
release
sylpheed 3.7.0 Potentially vulnerable Unspecified -
Fedora 42
release
sylpheed 3.7.0 Potentially vulnerable Unspecified -
Fedora Rawhide
development
sylpheed 3.7.0 Potentially vulnerable Unspecified -
FreeBSD Ports mail/sylpheed 3.7.0 Potentially vulnerable mail ehaupt@freebsd.org
GNU Guix sylpheed 3.7.0 Potentially vulnerable - -
GoboLinux Sylpheed 3.4.2 Potentially vulnerable - -
Homebrew sylpheed 3.7.0 Potentially vulnerable - -
HP-UX 11.31
hppa_32
sylpheed 3.7.0 Potentially vulnerable - -
HP-UX 11.31
ia64_64
sylpheed 3.7.0 Potentially vulnerable - -
HP-UX 11.31
hppa_32
sylpheed 3.6.0 Potentially vulnerable - -
HP-UX 11.31
ia64_32
sylpheed 3.6.0 Potentially vulnerable - -
HP-UX 11.31
hppa_32
sylpheed 3.3.0 Potentially vulnerable - -
Kali Linux Rolling
main
sylpheed 3.8.0~beta1 mail mones@debian.org, hayashi@clear-code.com, henrich@debian.org
MacPorts sylpheed 3.7.0 Potentially vulnerable mail fincham@github
Mageia 8
core/release
sylpheed 3.7.0 Potentially vulnerable Networking/Mail -
Mageia 8
core/updates
sylpheed 3.7.0 Potentially vulnerable Networking/Mail -
Mageia 9
core/release
sylpheed 3.7.0 Potentially vulnerable Networking/Mail -
Mageia cauldron
core/release
sylpheed 3.7.0 Potentially vulnerable Networking/Mail -
nixpkgs stable 22.11 sylpheed 3.7.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com
nixpkgs stable 23.05 sylpheed 3.7.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com
nixpkgs stable 23.11 sylpheed 3.7.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com
nixpkgs stable 24.05 sylpheed 3.7.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com
nixpkgs stable 24.11 sylpheed 3.7.0 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable 25.05 sylpheed 3.7.0 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs unstable sylpheed 3.7.0 Potentially vulnerable - fallback-mnt-nix@repology
Npackd Stable Sylpheed 3.7 Potentially vulnerable Communications -
OpenBSD Ports mail/sylpheed 3.7.0 Potentially vulnerable mail amit.obsd@gmail.com
OS4Depot sylpheed.lha 3.7.0 Potentially vulnerable network/email -
Parabola
pcr
sylpheed 3.7.0_3.8.0beta1 - -
Pardus 21
main
sylpheed 3.7.0 Potentially vulnerable mail mones@debian.org, hayashi@clear-code.com, henrich@debian.org
Parrot
parrot/main
sylpheed 3.8.0~beta1 mail mones@debian.org, hayashi@clear-code.com, henrich@debian.org
Parrot
parrot-updates/main
sylpheed 3.8.0~beta1 mail mones@debian.org, hayashi@clear-code.com, henrich@debian.org
PCLinuxOS sylpheed 3.7.0 Potentially vulnerable Networking/Mail -
Pisi Linux
main
sylpheed 3.7.0 Potentially vulnerable app:gui admins@pisilinux.org
pkgsrc current mail/sylpheed 3.7.0 Potentially vulnerable mail pkgsrc-users@netbsd.org
PureOS amber
amber/main
sylpheed 3.7.0 Potentially vulnerable mail mones@debian.org, hayashi@clear-code.com, henrich@debian.org
PureOS byzantium
byzantium/main
sylpheed 3.7.0 Potentially vulnerable mail mones@debian.org, hayashi@clear-code.com, henrich@debian.org
PureOS landing
landing/main
sylpheed 3.8.0~beta1 mail mones@debian.org, hayashi@clear-code.com, henrich@debian.org
Raspbian Oldstable
main
sylpheed 3.7.0 Potentially vulnerable mail mones@debian.org, hayashi@clear-code.com, henrich@debian.org
Raspbian Stable
main
sylpheed 3.8.0~beta1 mail mones@debian.org, hayashi@clear-code.com, henrich@debian.org
Raspbian Testing
main
sylpheed 3.8.0~beta1 mail mones@debian.org, hayashi@clear-code.com, henrich@debian.org
ReactOS rapps Sylpheed 3.7.0 Potentially vulnerable - -
Rosa 2021.1
contrib/release
sylpheed 3.7.0 Potentially vulnerable Networking/Mail a.proklov@rosalinux.ru
Rosa 13
contrib/release
sylpheed 3.8.0-beta1 Networking/Mail alexander@mezon.ru
Salix 14.2 sylpheed 3.5.0 Potentially vulnerable - -
SlackBuilds network/sylpheed 3.7.0 Potentially vulnerable network agianson@gmail.com
SliTaz Cooking sylpheed 3.7.0 Potentially vulnerable network pankso@slitaz.org
SliTaz Cooking sylpheed-dev 3.7.0 Potentially vulnerable development pankso@slitaz.org
SliTaz Cooking sylpheed-lang 3.7.0 Potentially vulnerable localization pankso@slitaz.org
SliTaz Cooking sylpheed-full 3.7.0 Potentially vulnerable network pankso@slitaz.org
SliTaz Next sylpheed 3.5.1 Potentially vulnerable network devel@slitaz.org
SliTaz Next sylpheed-dev 3.5.1 Potentially vulnerable development devel@slitaz.org
SliTaz Next sylpheed 3.5.1 Potentially vulnerable network devel@slitaz.org
SliTaz Next sylpheed-dev 3.5.1 Potentially vulnerable development devel@slitaz.org
SliTaz Next sylpheed-full 3.5.1 Potentially vulnerable network devel@slitaz.org
SliTaz Next sylpheed-full 3.5.1 Potentially vulnerable network devel@slitaz.org
T2 SDE sylpheed 3.7.0 Potentially vulnerable extra/office rene@t2-project.org
Trisquel 10.0
nabia/main
sylpheed 3.7.0 Potentially vulnerable universe/mail ubuntu-devel-discuss@lists.ubuntu.com, hayashi@clear-code.com, henrich@debian.org
Trisquel 11.0
aramo/main
sylpheed 3.7.0 Potentially vulnerable universe/mail ubuntu-devel-discuss@lists.ubuntu.com, hayashi@clear-code.com, henrich@debian.org
Ubuntu 14.04
trusty-updates/universe
sylpheed 3.4.1 Potentially vulnerable universe/mail ubuntu-devel-discuss@lists.ubuntu.com, claws@thewildbeast.co.uk, kov@debian.org
Ubuntu 14.04
trusty/universe
sylpheed 3.4.0~beta7 Potentially vulnerable universe/mail ubuntu-devel-discuss@lists.ubuntu.com, claws@thewildbeast.co.uk, kov@debian.org
Ubuntu 16.04
xenial/universe
sylpheed 3.5.0~rc2 Potentially vulnerable universe/mail ubuntu-devel-discuss@lists.ubuntu.com, henrich@debian.org
Ubuntu 18.04
bionic/universe
sylpheed 3.5.1 Potentially vulnerable universe/mail ubuntu-devel-discuss@lists.ubuntu.com, hayashi@clear-code.com, henrich@debian.org
Ubuntu 18.04
bionic-updates/universe
sylpheed 3.5.1 Potentially vulnerable universe/mail ubuntu-devel-discuss@lists.ubuntu.com, hayashi@clear-code.com, henrich@debian.org
Ubuntu 20.04
focal/universe
sylpheed 3.7.0 Potentially vulnerable universe/mail ubuntu-devel-discuss@lists.ubuntu.com, hayashi@clear-code.com, henrich@debian.org
Ubuntu 22.04
jammy/universe
sylpheed 3.7.0 Potentially vulnerable universe/mail ubuntu-devel-discuss@lists.ubuntu.com, hayashi@clear-code.com, henrich@debian.org
Ubuntu 24.04
noble/universe
sylpheed 3.8.0~beta1 universe/mail ubuntu-devel-discuss@lists.ubuntu.com, hayashi@clear-code.com, henrich@debian.org
Ubuntu 24.10
oracular/universe
sylpheed 3.8.0~beta1 universe/mail ubuntu-devel-discuss@lists.ubuntu.com, hayashi@clear-code.com, henrich@debian.org
Ubuntu 25.04
plucky/universe
sylpheed 3.8.0~beta1 universe/mail ubuntu-devel-discuss@lists.ubuntu.com, hayashi@clear-code.com, henrich@debian.org
Ubuntu 25.10
questing/universe
sylpheed 3.8.0~beta1 universe/mail ubuntu-devel-discuss@lists.ubuntu.com, hayashi@clear-code.com, henrich@debian.org
Void Linux x86_64
x86_64
sylpheed 3.7.0 Potentially vulnerable - orphan@voidlinux.org
Wikidata Sylpheed 3.8beta1 - -
Wikidata Sylpheed 3.7 Potentially vulnerable - -
winget Sylpheed E-Mail Client 3.7 Potentially vulnerable - -
winget Sylpheed E-Mail Client 3.6 Potentially vulnerable - -
winget Sylpheed E-Mail Client 3.5.1 Potentially vulnerable - -
winget Sylpheed E-Mail Client 3.5 Potentially vulnerable - -
winget Sylpheed E-Mail Client 3.4.3 Potentially vulnerable - -
winget Sylpheed E-Mail Client 3.4.2 Potentially vulnerable - -
winget Sylpheed E-Mail Client 3.4.1 Potentially vulnerable - -
winget Sylpheed E-Mail Client 3.3.1 Potentially vulnerable - -
winget Sylpheed E-Mail Client 3.3 Potentially vulnerable - -
winget Sylpheed E-Mail Client 3.2 Potentially vulnerable - -
winget Sylpheed E-Mail Client 3.1.4 Potentially vulnerable - -
winget Sylpheed E-Mail Client 3.1.3 Potentially vulnerable - -
winget Sylpheed E-Mail Client 3.1.2 Potentially vulnerable - -
winget Sylpheed E-Mail Client 3.1.1 Potentially vulnerable - -
winget Sylpheed E-Mail Client 3.1 Potentially vulnerable - -
winget Sylpheed E-Mail Client 3.0.3 Potentially vulnerable - -
winget Sylpheed E-Mail Client 3.0.2 Potentially vulnerable - -
winget Sylpheed E-Mail Client 3.0.1 Potentially vulnerable - -
winget Sylpheed E-Mail Client 3.0 Potentially vulnerable - -
winget Sylpheed E-Mail Client 2.7.1 Potentially vulnerable - -
winget Sylpheed E-Mail Client 2.7.0 Potentially vulnerable - -
winget Sylpheed E-Mail Client 2.6.0 Potentially vulnerable - -
winget Sylpheed E-Mail Client 2.5.0 Potentially vulnerable - -
winget Sylpheed E-Mail Client 2.4.8 Potentially vulnerable - -
winget Sylpheed E-Mail Client 2.4.7 Potentially vulnerable - -
winget Sylpheed E-Mail Client 2.4.6 Potentially vulnerable - -
winget Sylpheed E-Mail Client 2.4.5 Potentially vulnerable - -
winget Sylpheed E-Mail Client 2.4.4 Potentially vulnerable - -
winget Sylpheed E-Mail Client 2.4.3 Potentially vulnerable - -
winget Sylpheed E-Mail Client 2.4.2 Potentially vulnerable - -
winget Sylpheed E-Mail Client 2.4.1 Potentially vulnerable - -
winget Sylpheed E-Mail Client 2.4.0a Potentially vulnerable - -
winget Sylpheed E-Mail Client 2.3.1 Potentially vulnerable - -
winget Sylpheed E-Mail Client 2.3.0 Potentially vulnerable - -
winget Sylpheed E-Mail Client 2.2.10 Potentially vulnerable - -
winget Sylpheed E-Mail Client 2.2.9 Potentially vulnerable - -
winget Sylpheed E-Mail Client 2.2.8 Potentially vulnerable - -
winget Sylpheed E-Mail Client 2.2.7a Potentially vulnerable - -
winget Sylpheed E-Mail Client 2.2.7 Potentially vulnerable - -