Versions Packages Information History CVEs Related Badges Report

Versions for xpdf

171 package(s) known

Repository Package name Version Category Maintainer(s)
AIX Open Source Packages xpdf 3.04 - -
AIX Open Source Packages xpdf 3.03 - -
AIX Open Source Packages xpdf 3.02 Potentially vulnerable - -
AIX Open Source Packages xpdf 3.02 Potentially vulnerable - -
AIX Open Source Packages xpdf 3.02 Potentially vulnerable - -
AIX Open Source Packages xpdf 3.02 Potentially vulnerable - -
AIX Open Source Packages xpdf 3.02 Potentially vulnerable - -
AIX Toolbox xpdf 1.00 Potentially vulnerable Applications/Publishing -
Alpine Linux 3.8
community
xpdf 3.04 - ibid.ag@gmail.com
Alpine Linux 3.8
community
xpdf-doc 3.04 - ibid.ag@gmail.com
Alpine Linux 3.9
community
xpdf-doc 3.04 - ibid.ag@gmail.com
Alpine Linux 3.9
community
xpdf 3.04 - ibid.ag@gmail.com
Alpine Linux 3.10
community
xpdf 3.04 - ibid.ag@gmail.com
Alpine Linux 3.10
community
xpdf-doc 3.04 - ibid.ag@gmail.com
Alpine Linux 3.11
community
xpdf 3.04 - ibid.ag@gmail.com
Alpine Linux 3.11
community
xpdf-doc 3.04 - ibid.ag@gmail.com
Alpine Linux 3.12
community
xpdf 3.04 - ibid.ag@gmail.com
Alpine Linux 3.12
community
xpdf-doc 3.04 - ibid.ag@gmail.com
Alpine Linux 3.13
community
xpdf 4.03 Potentially vulnerable - ibid.ag@gmail.com
Alpine Linux 3.13
community
xpdf-doc 4.03 Potentially vulnerable - ibid.ag@gmail.com
Alpine Linux 3.14
community
xpdf-doc 4.03 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.14
community
xpdf 4.03 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.15
community
xpdf-doc 4.03 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.15
community
xpdf 4.03 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.16
community
xpdf-doc 4.04 Potentially vulnerable - ja@sdomi.pl
Alpine Linux 3.16
community
xpdf 4.04 Potentially vulnerable - ja@sdomi.pl
Alpine Linux Edge
community
xpdf-doc 4.04 Potentially vulnerable - ja@sdomi.pl
Alpine Linux Edge
community
xpdf 4.04 Potentially vulnerable - ja@sdomi.pl
ALT Linux p9 xpdf 4.03 Potentially vulnerable Office bircoph@altlinux.org
ALT Linux p10 xpdf 4.03 Potentially vulnerable Office bircoph@altlinux.org
ALT Sisyphus xpdf 4.04 Potentially vulnerable Office bircoph@altlinux.org
Arch
community
xpdf 4.04 Potentially vulnerable - -
Arch Linux 32 i486
community
xpdf 4.03 Potentially vulnerable - -
Arch Linux 32 i686
community
xpdf 4.03 Potentially vulnerable - -
Arch Linux 32 pentium4
community
xpdf 4.03 Potentially vulnerable - -
Arch Linux ARM aarch64
community
xpdf 4.04 Potentially vulnerable - -
Arch Linux ARM armv7h
community
xpdf 4.04 Potentially vulnerable - -
Artix
galaxy
xpdf 4.04 Potentially vulnerable - -
CRUX 3.4
opt
xpdf 4.00 Potentially vulnerable - tek@serverop.de
CRUX 3.5
opt
xpdf 4.02 Potentially vulnerable - tek@serverop.de
Cygwin xpdf 4.04 Potentially vulnerable X11 ken.brown@cygwin
Cygwin xpdf-debuginfo 4.04 Potentially vulnerable Debug ken.brown@cygwin
Debian 8
jessie/main
xpdf 3.03 text mgilbert@debian.org
Debian 9
stretch/main
xpdf 3.04 text packages@qa.debian.org
Debian 10
buster/main
xpdf 3.04 text packages@qa.debian.org
Debian 10 Backports
buster-backports/main
xpdf 3.04+git20210103 misc fsfs@debian.org
Debian 11
bullseye/main
xpdf 3.04+git20210103 text fsfs@debian.org
Debian 12
bookworm/main
xpdf 3.04+git20220601 text fsfs@debian.org
Debian Unstable
sid/main
xpdf 3.04+git20220601 text fsfs@debian.org
Deepin
main
xpdf 3.04 - packages@qa.debian.org
Devuan 1.0
jessie/main
xpdf 3.03 text mgilbert@debian.org
Devuan 2.0
ascii/main
xpdf 3.04 text packages@qa.debian.org
Devuan 3.0
beowulf/main
xpdf 3.04 text packages@qa.debian.org
Devuan 4.0
chimaera/main
xpdf 3.04+git20210103 text fsfs@debian.org
Devuan Unstable
unstable/main
xpdf 3.04+git20220601 text fsfs@debian.org
DPorts graphics/xpdf4 4.03 Potentially vulnerable graphics cy@freebsd.org
DPorts graphics/xpdf 4.03 Potentially vulnerable graphics cy@freebsd.org
DPorts graphics/xpdf3 3.04 graphics cy@freebsd.org
Entware
mipssf-k3.4
xpdf 4.04 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
xpdf 4.04 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
xpdf 4.04 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
xpdf 4.04 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
xpdf 4.04 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
xpdf 4.04 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
xpdf 4.04 Potentially vulnerable utils fallback-mnt-entware@repology
EPEL 6 xpdf 3.04 Applications/Publishing -
EPEL 7 xpdf 3.04 Applications/Publishing -
Fedora 26
release
xpdf 3.04 Applications/Publishing -
Fedora 27
updates
xpdf 4.00 Potentially vulnerable Applications/Publishing -
Fedora 27
release
xpdf 4.00 Potentially vulnerable Applications/Publishing -
Fedora 28
release
xpdf 4.00 Potentially vulnerable Applications/Publishing -
Fedora 29
updates
xpdf 4.02 Potentially vulnerable Unspecified -
Fedora 29
release
xpdf 4.00 Potentially vulnerable Applications/Publishing -
Fedora 30
updates
xpdf 4.02 Potentially vulnerable Unspecified -
Fedora 30
release
xpdf 4.01 Unspecified -
Fedora 31
updates
xpdf 4.02 Potentially vulnerable Unspecified -
Fedora 31
release
xpdf 4.01 Unspecified -
Fedora 32
updates
xpdf 4.03 Potentially vulnerable Unspecified -
Fedora 32
release
xpdf 4.02 Potentially vulnerable Unspecified -
Fedora 33
updates
xpdf 4.03 Potentially vulnerable Unspecified -
Fedora 33
release
xpdf 4.02 Potentially vulnerable Unspecified -
Fedora 34
updates
xpdf 4.04 Potentially vulnerable Unspecified -
Fedora 34
release
xpdf 4.03 Potentially vulnerable Unspecified -
Fedora 35
updates
xpdf 4.04 Potentially vulnerable Unspecified -
Fedora 35
release
xpdf 4.03 Potentially vulnerable Unspecified -
Fedora 36
updates
xpdf 4.04 Potentially vulnerable Unspecified -
Fedora 36
release
xpdf 4.03 Potentially vulnerable Unspecified -
Fedora Rawhide
development
xpdf 4.04 Potentially vulnerable Unspecified -
FreeBSD Ports graphics/xpdf4 4.04 Potentially vulnerable graphics cy@freebsd.org
FreeBSD Ports graphics/xpdf 4.04 Potentially vulnerable graphics cy@freebsd.org
FreeBSD Ports graphics/xpdf3 3.04 graphics cy@freebsd.org
freshcode.club xpdf 4.0.2 Potentially vulnerable - -
Funtoo 1.4
text-kit
app-text/xpdf 4.04 Potentially vulnerable app-text fallback-mnt-funtoo@repology
Gentoo app-text/xpdf 4.04 Potentially vulnerable app-text bircoph@gentoo.org
GNU Guix xpdf 4.03 Potentially vulnerable - -
GoboLinux Xpdf 3.04 - -
HaikuPorts master app-text/xpdf 4.04 Potentially vulnerable app-text -
HaikuPorts master app-text/xpdf 3.04 app-text -
Homebrew xpdf 4.04 Potentially vulnerable - -
HP-UX 11.31
hppa_32
xpdf 3.04 - -
HP-UX 11.31
ia64_32
xpdf 3.04 - -
HP-UX 11.31
ia64_64
xpdf 3.04 - -
HP-UX 11.31
hppa_32
xpdf 3.03 - -
Kali Linux Rolling
main
xpdf 3.04+git20220601 text fsfs@debian.org
LiGurOS stable app-text/xpdf 4.04 Potentially vulnerable app-text bircoph@gentoo.org
LiGurOS develop app-text/xpdf 4.04 Potentially vulnerable app-text bircoph@gentoo.org
MacPorts xpdf 3.04 graphics nomaintainer@macports.org
Mageia 7
core/updates
xpdf 4.03 Potentially vulnerable Publishing -
Mageia 7
core/updates
xpdf 4.02 Potentially vulnerable Publishing -
Mageia 7
core/updates
xpdf 4.02 Potentially vulnerable Publishing -
Mageia 7
core/updates
xpdf 4.02 Potentially vulnerable Publishing -
Mageia 7
core/release
xpdf 4.01.01 Potentially vulnerable Publishing -
Mageia 8
core/updates
xpdf 4.03 Potentially vulnerable Publishing -
Mageia 8
core/release
xpdf 4.02 Potentially vulnerable Publishing -
Mageia Cauldron
core/release
xpdf 4.04 Potentially vulnerable Publishing -
Manjaro Stable
community
xpdf 4.04 Potentially vulnerable - -
Manjaro Testing
community
xpdf 4.04 Potentially vulnerable - -
Manjaro Unstable
community
xpdf 4.04 Potentially vulnerable - -
MidnightBSD mports graphics/xpdf3 3.04 graphics -
MSYS2 mingw
x86_64
mingw-w64-x86_64-xpdf 4.04 Potentially vulnerable - -
MSYS2 mingw
i686
mingw-w64-i686-xpdf 4.04 Potentially vulnerable - -
nixpkgs stable 21.05 xpdf 4.03 Potentially vulnerable - sikmir@gmail.com
nixpkgs stable 21.11 xpdf 4.03 Potentially vulnerable - sikmir@gmail.com
nixpkgs stable 22.05 xpdf 4.04 Potentially vulnerable - sikmir@disroot.org
nixpkgs unstable xpdf 4.04 Potentially vulnerable - sikmir@disroot.org
OpenBSD Ports textproc/xpdf 3.04 textproc ports@openbsd.org
openmamba
devel
xpdf 4.03 Potentially vulnerable Graphical Desktop/Applications/Publishing silvan.calarco@mambasoft.it
OpenPKG xpdf 4.01.01pl0 Postscript -
Parabola
community
xpdf 4.04 Potentially vulnerable - -
Pardus 17
main
xpdf 3.04 text packages@qa.debian.org
Pardus 19
main
xpdf 3.04 text packages@qa.debian.org
Pardus 21
main
xpdf 3.04+git20210103 text fsfs@debian.org
Parrot
parrot-updates/main
xpdf 3.04+git20210103 text fsfs@debian.org
Parrot
parrot/main
xpdf 3.04+git20210103 text fsfs@debian.org
Pisi Linux Contrib xpdf 4.03 Potentially vulnerable app uglyside@yandex.ru
pkgsrc current print/xpdf4 4.03 Potentially vulnerable print pkgsrc-users@netbsd.org
pkgsrc current print/xpdf 3.04 print pkgsrc-users@netbsd.org
PLD Linux xpdf 4.02 Potentially vulnerable - -
PureOS Amber xpdf 3.04 misc packages@qa.debian.org
PureOS landing xpdf 3.04+git20210103 misc fsfs@debian.org
Raspbian Oldstable
main
xpdf 3.04 text packages@qa.debian.org
Raspbian Stable
main
xpdf 3.04+git20210103 text fsfs@debian.org
Raspbian Testing
main
xpdf 3.04+git20220601 text fsfs@debian.org
Rosa 2014.1
contrib/updates
xpdf 3.04 - -
Rosa 2014.1
contrib/release
xpdf 3.03 - -
Rosa 2016.1
contrib/updates
xpdf 4.02 Potentially vulnerable - -
Rosa 2016.1
contrib/release
xpdf 3.04 - -
Rosa 2021.1
contrib/release
xpdf 4.04 Potentially vulnerable Publishing alexander@mezon.ru
Slackware 14.2
slackware
xpdf 3.04 - volkerdi@slackware.com
Slackware 15.0
slackware
xpdf 4.03 Potentially vulnerable - volkerdi@slackware.com
Slackware current
slackware
xpdf 4.04 Potentially vulnerable - volkerdi@slackware.com
Slackware64 14.2
slackware64
xpdf 3.04 - volkerdi@slackware.com
Slackware64 15.0
slackware64
xpdf 4.03 Potentially vulnerable - volkerdi@slackware.com
Slackware64 current
slackware64
xpdf 4.04 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 14.2
slackware
xpdf 3.04 - volkerdi@slackware.com
Slackwarearm 15.0
slackware
xpdf 4.03 Potentially vulnerable - volkerdi@slackware.com
T2 SDE xpdf 4.04 Potentially vulnerable extra/office rene@t2-project.org
Termux xpdf 4.03 Potentially vulnerable - termux@github
Trisquel 6.0
toutatis/main
xpdf 3.02 Potentially vulnerable universe/text michael.s.gilbert@gmail.com, osamu@debian.org
Trisquel 7.0
belenos/main
xpdf 3.03 universe/text mgilbert@debian.org
Trisquel 8.0
flidas/main
xpdf 3.04 universe/text ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 8.0
flidas-updates/main
xpdf 3.04 universe/text ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 9.0
etiona/main
xpdf 3.04 universe/text packages@qa.debian.org
Ubuntu 14.04
trusty/universe
xpdf 3.03 universe/text mgilbert@debian.org
Ubuntu 16.04
xenial/universe
xpdf 3.04 universe/text ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 16.04
xenial-updates/universe
xpdf 3.04 universe/text ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 18.04
bionic/universe
xpdf 3.04 universe/text packages@qa.debian.org
Ubuntu 22.04
jammy/universe
xpdf 3.04+git20220201 universe/text fsfs@debian.org
Ubuntu 22.10
kinetic/universe
xpdf 3.04+git20220601 universe/text fsfs@debian.org
Void Linux x86_64
x86_64
xpdf 4.04 Potentially vulnerable - leah@vuxu.org
Wikidata Xpdf 4.04 Potentially vulnerable - -