Versions Packages Information History CVEs Related Badges Report

Packages for 389-ds-base

221 package(s) known

AlmaLinux 8
AppStream

389-ds-base

1.4.3.28 Potentially vulnerable (1.4.3.28-6.module_el8.6.0+2734+1efaf02b)
AlmaLinux 8
AppStream

389-ds-base

1.4.3.28 Potentially vulnerable (1.4.3.28-7.module_el8.6.0+3071+d20b1d7c)
AlmaLinux 9
AppStream

389-ds-base

2.0.14 (2.0.14-1.el9)

389-ds-base

1.4.1.18 Potentially vulnerable (1.4.1.18-alt5)

389-ds-base

1.4.3.25 Potentially vulnerable (1.4.3.25-alt1)

389-ds-base

1.4.3.28 Potentially vulnerable (1.4.3.28-alt3)

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-9.67.amzn1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-16.69.amzn1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.9.1 Potentially vulnerable (1.3.9.1-12.65.amzn1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.8.4 Potentially vulnerable (1.3.8.4-25.1.62.amzn1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.8.4 Potentially vulnerable (1.3.8.4-18.60.amzn1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-28.58.amzn1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-21.56.amzn1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-28.54.amzn1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-16.amzn2.0.1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-12.amzn2.0.1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-13.amzn2.0.1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.9.1 Potentially vulnerable (1.3.9.1-12.amzn2.0.1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.8.4 Potentially vulnerable (1.3.8.4-15.amzn2.0.1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.8.4 Potentially vulnerable (1.3.8.4-25.1.amzn2.0.1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-21.amzn2.0.2)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-28.amzn2.0.1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-21.amzn2.0.1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-28.amzn2.0.1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-26.amzn2.0.1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-21.amzn2.0.1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):
Arch
extra

389-ds-base

2.3.0 (2.3.0-1)

389-ds-base

2.3.0 (2.3.0-1.0)

389-ds-base

2.3.0 (2.3.0-1.0)

389-ds-base

2.3.0 (2.3.0-1)

389-ds-base

2.3.0 (2.3.0-1)

389-ds-base

1.3.10.1 Potentially vulnerable (1.3.10.1-astra8)

389-ds-base

1.2.11.15 Potentially vulnerable (1.2.11.15-95.el6_9)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Links(s):
CentOS 6
updates

389-ds-base

1.2.11.15 Potentially vulnerable (1.2.11.15-97.el6_10)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Links(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-6.el7)
CentOS 7
updates

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-10.el7_9)
CentOS 7
updates

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-12.el7_9)
CentOS 7
updates

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-13.el7_9)
CentOS 7
updates

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-14.el7_9)
CentOS 7
updates

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-15.el7_9)
CentOS 7
updates

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-16.el7_9)
CentOS 7
updates

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-7.1.el7_9)
CentOS 7
updates

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-8.el7_9)
CentOS 7
updates

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-9.el7_9)
CentOS 8
AppStream

389-ds-base

1.4.3.23 Potentially vulnerable (1.4.3.23-10.module_el8.5.0+946+51aba098)
CentOS 8
AppStream

389-ds-base

1.4.3.23 Potentially vulnerable (1.4.3.23-12.module_el8.5.0+1056+b3c5a4b9)
CentOS Stream 8
AppStream

389-ds-base

1.4.3.30 Potentially vulnerable (1.4.3.30-6.module_el8.7.0+1215+4ecf03c5)
CentOS Stream 8
AppStream

389-ds-base

1.4.3.28 Potentially vulnerable (1.4.3.28-6.module_el8.6.0+1102+fe5d910f)
CentOS Stream 8
AppStream

389-ds-base

1.4.3.23 Potentially vulnerable (1.4.3.23-10.module_el8.5.0+946+51aba098)
CentOS Stream 8
AppStream

389-ds-base

1.4.3.23 Potentially vulnerable (1.4.3.23-2.module_el8.5.0+835+5d54734c)
CentOS Stream 8
AppStream

389-ds-base

1.4.3.23 Potentially vulnerable (1.4.3.23-7.module_el8.5.0+889+90e0384f)
CentOS Stream 8
AppStream

389-ds-base

1.4.3.16 Potentially vulnerable (1.4.3.16-8.module_el8.4.0+644+ed25d39e)
CentOS Stream 9
AppStream

389-ds-base

2.1.3 (2.1.3-3.el9)
CentOS Stream 9
AppStream

389-ds-base

2.1.1 (2.1.1-3.el9)
CentOS Stream 9
AppStream

389-ds-base

2.0.14 (2.0.14-1.el9)
CentOS Stream 9
AppStream

389-ds-base

2.0.11 (2.0.11-1.el9)
CentOS Stream 9
AppStream

389-ds-base

2.0.11 (2.0.11-3.el9)
CentOS Stream 9
AppStream

389-ds-base

2.0.8 (2.0.8-4.el9)
CentOS Stream 9
AppStream

389-ds-base

2.0.8 (2.0.8-5.el9)
Deepin
main

389-ds-base

1.4.0.21.1 Potentially vulnerable (1.4.0.21.1-1+security)
Devuan 1.0
jessie/main

389-ds-base

1.3.3.5 Potentially vulnerable (1.3.3.5-4)
Devuan 2.0
ascii/main

389-ds-base

1.3.5.17 Potentially vulnerable (1.3.5.17-2)
Devuan 3.0
beowulf/main

389-ds-base

1.4.0.21 Potentially vulnerable (1.4.0.21-1)
Devuan 4.0
chimaera/main

389-ds-base

1.4.4.11 Potentially vulnerable (1.4.4.11-2+devuan0.1)
Devuan Unstable
unstable/main

389-ds-base

2.0.15 (2.0.15-1.1)
EuroLinux 8
appstream

389-ds-base

1.4.3.28 Potentially vulnerable (1.4.3.28-7.module+el8.6.0+15293+4900ec12)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):
EuroLinux 8
appstream

389-ds-base

1.4.3.23 Potentially vulnerable (1.4.3.23-10.module+el8.5.0+12398+47000435)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):
EuroLinux 8
appstream

389-ds-base

1.4.3.23 Potentially vulnerable (1.4.3.23-12.module+el8.5.0+13329+4096c77a)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):
EuroLinux 8
appstream

389-ds-base

1.4.3.23 Potentially vulnerable (1.4.3.23-14.module+el8.5.0+14377+c731dc97)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):
EuroLinux 8
appstream

389-ds-base

1.4.3.16 Potentially vulnerable (1.4.3.16-16.module+el8.4.0+11446+fc96bc48)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):
EuroLinux 8
appstream

389-ds-base

1.4.3.16 Potentially vulnerable (1.4.3.16-19.module+el8.4.0+11894+f5bb5c43)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):
EuroLinux 8
appstream

389-ds-base

1.4.3.8 Potentially vulnerable (1.4.3.8-7.module+el8.3.0+10310+6e88d919)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):
Fedora 26
updates

389-ds-base

1.3.6.15 Potentially vulnerable (1.3.6.15-1.fc26)
Fedora 26
release

389-ds-base

1.3.6.6 Potentially vulnerable (1.3.6.6-2.fc26)
Fedora 27
updates

389-ds-base

1.3.9.0 Potentially vulnerable (1.3.9.0-1.fc27)
Fedora 27
release

389-ds-base

1.3.7.3 Potentially vulnerable (1.3.7.3-1.fc27)
Fedora 28
updates

389-ds-base

1.4.0.22 Potentially vulnerable (1.4.0.22-1.fc28)
Fedora 28
release

389-ds-base

1.4.0.6 Potentially vulnerable (1.4.0.6-2.fc28)
Fedora 29
updates

389-ds-base

1.4.0.31 Potentially vulnerable (1.4.0.31-1.fc29)
Fedora 29
release

389-ds-base

1.4.0.16 Potentially vulnerable (1.4.0.16-1.fc29)
Fedora 30
updates

389-ds-base

1.4.1.19 Potentially vulnerable (1.4.1.19-1.fc30)
Fedora 30
release

389-ds-base

1.4.1.2 Potentially vulnerable (1.4.1.2-2.fc30)
Fedora 31
updates

389-ds-base

1.4.2.16 Potentially vulnerable (1.4.2.16-1.fc31)
Fedora 31
release

389-ds-base

1.4.1.8 Potentially vulnerable (1.4.1.8-3.fc31)
Fedora 32
updates

389-ds-base

1.4.3.23 Potentially vulnerable (1.4.3.23-1.fc32)
Fedora 32
release

389-ds-base

1.4.3.3 Potentially vulnerable (1.4.3.3-3.fc32)
Fedora 33
updates

389-ds-base

1.4.4.17 Potentially vulnerable (1.4.4.17-1.fc33)
Fedora 33
release

389-ds-base

1.4.4.4 Potentially vulnerable (1.4.4.4-1.fc33.2)
Fedora 34
updates

389-ds-base

2.0.15 (2.0.15-1.fc34)
Fedora 34
release

389-ds-base

2.0.3 Potentially vulnerable (2.0.3-3.fc34)
Fedora 35
updates

389-ds-base

2.0.16 (2.0.16-1.fc35)
Fedora 35
release

389-ds-base

2.0.10 (2.0.10-1.fc35)
Fedora 36
updates

389-ds-base

2.1.5 (2.1.5-1.fc36)
Fedora 36
release

389-ds-base

2.1.1 (2.1.1-1.fc36)
Fedora 37
development

389-ds-base

2.2.3 (2.2.3-1.fc37)
Fedora Rawhide
development

389-ds-base

2.3.0 (2.3.0-2.fc38)
Funtoo 1.4
net-kit

net-nds/389-ds-base

9999
Funtoo 1.4
net-kit

net-nds/389-ds-base

1.3.6.8 Potentially vulnerable (1.3.6.8-r1)
Funtoo 1.4
net-kit

net-nds/389-ds-base

1.3.5.19 Potentially vulnerable

net-nds/389-ds-base

2.1.0 (2.1.0-r2)

net-nds/389-ds-base

1.4.4.19 Potentially vulnerable (1.4.4.19-r3)

389-ds-base

1.4.4.17 Potentially vulnerable

389-ds-base

2.0.15 (2.0.15-1)

net-nds/389-ds-base

2.1.0 (2.1.0-r2)

net-nds/389-ds-base

1.4.4.19 Potentially vulnerable (1.4.4.19-r3)

net-nds/389-ds-base

2.1.0 (2.1.0-r2)

net-nds/389-ds-base

1.4.4.19 Potentially vulnerable (1.4.4.19-r3)
Mageia 7
core/updates

389-ds-base

1.4.0.26 Potentially vulnerable (1.4.0.26-1.1.mga7)
Mageia 7
core/release

389-ds-base

1.4.0.18 Potentially vulnerable (1.4.0.18-4.mga7)
Mageia 8
core/release

389-ds-base

1.4.0.26 Potentially vulnerable (1.4.0.26-8.mga8)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System/Servers
  • License:
    • GPLv3+
  • Links(s):
Mageia 8
core/updates

389-ds-base

1.4.0.26 Potentially vulnerable (1.4.0.26-8.1.mga8)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System/Servers
  • License:
    • GPLv3+
  • Links(s):
Mageia 8
core/updates

389-ds-base

1.4.0.26 Potentially vulnerable (1.4.0.26-8.2.mga8)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System/Servers
  • License:
    • GPLv3+
  • Links(s):
Mageia 8
core/updates

389-ds-base

1.4.0.26 Potentially vulnerable (1.4.0.26-8.4.mga8)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System/Servers
  • License:
    • GPLv3+
  • Links(s):
Mageia 8
core/updates

389-ds-base

1.4.0.26 Potentially vulnerable (1.4.0.26-8.5.mga8)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System/Servers
  • License:
    • GPLv3+
  • Links(s):
Mageia Cauldron
core/release

389-ds-base

1.4.0.26 Potentially vulnerable (1.4.0.26-15.mga9)

389-ds-base

2.3.0 (2.3.0-1)

389-ds-base

2.3.0 (2.3.0-1)

389-ds-base

2.3.0 (2.3.0-1)

389-ds-base

1.3.9.1 Potentially vulnerable

389-ds-base

2.0.7

389-ds-base

2.0.7

389-ds-base

2.0.7

389-ds-base

1.4.3.20 Potentially vulnerable (1.4.3.20-1.oe2203)
Parabola
extra

389-ds-base

2.3.0 (2.3.0-1)

389-ds-base

1.4.0.21 Potentially vulnerable (1.4.0.21-1)

389-ds-base

1.4.4.11 Potentially vulnerable (1.4.4.11-2)
Parrot
parrot-updates/main

389-ds-base

1.4.4.11 Potentially vulnerable (1.4.4.11-2)
Parrot
parrot/main

389-ds-base

1.4.4.11 Potentially vulnerable (1.4.4.11-2)

389-ds-base

1.4.0.21 Potentially vulnerable (1.4.0.21-1)

389-ds-base

1.4.4.11 Potentially vulnerable (1.4.4.11-2)

389-ds-base

1.4.0.21 Potentially vulnerable (1.4.0.21-1+rpi1)

389-ds-base

1.4.4.11 Potentially vulnerable (1.4.4.11-2+rpi1)

389-ds-base

2.0.15 (2.0.15-1.1+rpi1)
Rocky Linux 8
AppStream

389-ds-base

1.4.3.28 Potentially vulnerable (1.4.3.28-6.module+el8.6.0+782+23a9774d)
Rocky Linux 8
AppStream

389-ds-base

1.4.3.28 Potentially vulnerable (1.4.3.28-7.module+el8.6.0+994+f0479f39)
Rosa 2016.1
contrib/updates

389-ds-base

1.4.1.1 Potentially vulnerable (1.4.1.1-8)
Rosa 2021.1
main/release

389-ds-base

1.4.4.4 Potentially vulnerable (1.4.4.4-9)
Rosa 2021.1
contrib/release

389-ds-base

1.4.1.1 Potentially vulnerable (1.4.1.1-8)
Rosa Server 6.9
base/release

389-ds-base

1.2.11.15 Potentially vulnerable (1.2.11.15-62.res6)
Rosa Server 6.9
base/release

389-ds-base

1.2.11.15 Potentially vulnerable (1.2.11.15-69.res6)
Rosa Server 6.9
base/release

389-ds-base

1.2.11.15 Potentially vulnerable (1.2.11.15-74.res6)
Rosa Server 6.9
base/release

389-ds-base

1.2.11.15 Potentially vulnerable (1.2.11.15-91.res6)
Rosa Server 7.3
base/release

389-ds-base

1.3.5.10 Potentially vulnerable (1.3.5.10-21.res7)
Rosa Server 7.5
base/release

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-18.res7)
Rosa Server 7.5
base/release

389-ds-base

1.3.5.10 Potentially vulnerable (1.3.5.10-21.res7)

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-12.el7_9)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-10.el7_9)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-13.el7_9)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-14.el7_9)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-15.el7_9)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-16.el7_9)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-6.el7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-7.1.el7_9)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-8.el7_9)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-9.el7_9)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.10.1 Potentially vulnerable (1.3.10.1-14.el7_8)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.10.1 Potentially vulnerable (1.3.10.1-5.el7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.10.1 Potentially vulnerable (1.3.10.1-9.el7_8)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.9.1 Potentially vulnerable (1.3.9.1-10.el7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.9.1 Potentially vulnerable (1.3.9.1-12.el7_7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.9.1 Potentially vulnerable (1.3.9.1-13.el7_7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.8.4 Potentially vulnerable (1.3.8.4-15.el7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.8.4 Potentially vulnerable (1.3.8.4-18.el7_6)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.8.4 Potentially vulnerable (1.3.8.4-22.el7_6)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.8.4 Potentially vulnerable (1.3.8.4-23.el7_6)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.8.4 Potentially vulnerable (1.3.8.4-25.1.el7_6)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-18.el7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-19.el7_5)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-21.el7_5)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-24.el7_5)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-25.el7_5)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-28.el7_5)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-16.el7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-19.el7_4)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-21.el7_4)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-24.el7_4)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-26.el7_4)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-28.el7_4)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-29.el7_4)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.5.10 Potentially vulnerable (1.3.5.10-11.el7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.5.10 Potentially vulnerable (1.3.5.10-12.el7_3)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.5.10 Potentially vulnerable (1.3.5.10-15.el7_3)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.5.10 Potentially vulnerable (1.3.5.10-18.el7_3)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.5.10 Potentially vulnerable (1.3.5.10-20.el7_3)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.5.10 Potentially vulnerable (1.3.5.10-21.el7_3)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.4.0 Potentially vulnerable (1.3.4.0-30.el7_2)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.4.0 Potentially vulnerable (1.3.4.0-19.el7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Links(s):

389-ds-base

1.3.4.0 Potentially vulnerable (1.3.4.0-21.el7_2)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Links(s):

389-ds-base

1.3.4.0 Potentially vulnerable (1.3.4.0-26.el7_2)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Links(s):

389-ds-base

1.3.4.0 Potentially vulnerable (1.3.4.0-29.el7_2)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.4.0 Potentially vulnerable (1.3.4.0-32.el7_2)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.4.0 Potentially vulnerable (1.3.4.0-33.el7_2)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.3.1 Potentially vulnerable (1.3.3.1-13.el7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Links(s):

389-ds-base

1.3.3.1 Potentially vulnerable (1.3.3.1-15.el7_1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Links(s):

389-ds-base

1.3.3.1 Potentially vulnerable (1.3.3.1-16.el7_1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Links(s):

389-ds-base

1.3.3.1 Potentially vulnerable (1.3.3.1-20.el7_1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Links(s):

389-ds-base

1.3.3.1 Potentially vulnerable (1.3.3.1-23.el7_1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Links(s):

389-ds-base

1.3.1.6 Potentially vulnerable (1.3.1.6-10.el7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Links(s):

389-ds-base

1.3.1.6 Potentially vulnerable (1.3.1.6-25.el7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Links(s):

389-ds-base

1.3.1.6 Potentially vulnerable (1.3.1.6-26.el7_0)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Links(s):
Trisquel 6.0
toutatis/main

389-ds-base

1.2.10.4 Potentially vulnerable (1.2.10.4-0ubuntu3)
Trisquel 6.0
toutatis-updates/main

389-ds-base

1.2.10.4 Potentially vulnerable (1.2.10.4-0ubuntu3.1)
Trisquel 7.0
belenos/main

389-ds-base

1.3.2.16 Potentially vulnerable (1.3.2.16-0ubuntu1)
Trisquel 8.0
flidas/main

389-ds-base

1.3.4.9 Potentially vulnerable (1.3.4.9-1)
Trisquel 9.0
etiona/main

389-ds-base

1.3.7.10 Potentially vulnerable (1.3.7.10-1ubuntu1)
Trisquel 10.0
nabia/main

389-ds-base

1.4.3.6 Potentially vulnerable (1.4.3.6-2)
Ubuntu 18.04
bionic/universe

389-ds-base

1.3.7.10 Potentially vulnerable (1.3.7.10-1ubuntu1)

389 Directory Server

2.1.1