Versions Packages Information History CVEs Related Badges Report

Packages for 389-ds-base

238 package(s) known

AlmaLinux 8
AppStream

389-ds-base

1.4.3.37 Potentially vulnerable (1.4.3.37-1.module_el8.9.0+3644+b2e68550)
AlmaLinux 9
AppStream

389-ds-base

2.3.6 Potentially vulnerable (2.3.6-3.el9_3)

389-ds-base

1.4.1.18 Potentially vulnerable (1.4.1.18-alt5)

389-ds-base

2.2.3 Potentially vulnerable (2.2.3-alt2)

389-ds-base

2.2.9 Potentially vulnerable (2.2.9-alt1.1)

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-9.67.amzn1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-16.69.amzn1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.9.1 Potentially vulnerable (1.3.9.1-12.65.amzn1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.8.4 Potentially vulnerable (1.3.8.4-18.60.amzn1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.8.4 Potentially vulnerable (1.3.8.4-25.1.62.amzn1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-28.58.amzn1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-21.56.amzn1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-28.54.amzn1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-16.amzn2.0.1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-13.amzn2.0.1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-12.amzn2.0.1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-17.amzn2.0.1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.9.1 Potentially vulnerable (1.3.9.1-12.amzn2.0.1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.8.4 Potentially vulnerable (1.3.8.4-25.1.amzn2.0.1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.8.4 Potentially vulnerable (1.3.8.4-15.amzn2.0.1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-21.amzn2.0.2)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-21.amzn2.0.1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-28.amzn2.0.1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-26.amzn2.0.1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-21.amzn2.0.1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-28.amzn2.0.1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):
Arch
extra

389-ds-base

2.4.3 (2.4.3-1)

389-ds-base

2.3.1 Potentially vulnerable (2.3.1-3.0)

389-ds-base

2.3.1 Potentially vulnerable (2.3.1-3.0)

389-ds-base

2.4.2 (2.4.2-1)

389-ds-base

1.2.11.15 Potentially vulnerable (1.2.11.15-95.el6_9)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Link(s):
CentOS 6
updates

389-ds-base

1.2.11.15 Potentially vulnerable (1.2.11.15-97.el6_10)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Link(s):
CentOS 7
updates

389-ds-base

1.3.11.1 Potentially vulnerable (1.3.11.1-1.el7_9)
CentOS 7
updates

389-ds-base

1.3.11.1 Potentially vulnerable (1.3.11.1-2.el7_9)
CentOS 7
updates

389-ds-base

1.3.11.1 Potentially vulnerable (1.3.11.1-3.el7_9)

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-6.el7)
CentOS 7
updates

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-10.el7_9)
CentOS 7
updates

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-12.el7_9)
CentOS 7
updates

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-13.el7_9)
CentOS 7
updates

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-14.el7_9)
CentOS 7
updates

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-15.el7_9)
CentOS 7
updates

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-16.el7_9)
CentOS 7
updates

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-17.el7_9)
CentOS 7
updates

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-7.1.el7_9)
CentOS 7
updates

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-8.el7_9)
CentOS 7
updates

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-9.el7_9)
CentOS 8
AppStream

389-ds-base

1.4.3.23 Potentially vulnerable (1.4.3.23-10.module_el8.5.0+946+51aba098)
CentOS 8
AppStream

389-ds-base

1.4.3.23 Potentially vulnerable (1.4.3.23-12.module_el8.5.0+1056+b3c5a4b9)
CentOS Stream 8
AppStream

389-ds-base

1.4.3.37 Potentially vulnerable (1.4.3.37-1.module_el8+654+44d206ea)
CentOS Stream 8
AppStream

389-ds-base

1.4.3.36 Potentially vulnerable (1.4.3.36-1.module_el8+462+b1f840b3)
CentOS Stream 8
AppStream

389-ds-base

1.4.3.36 Potentially vulnerable (1.4.3.36-2.module_el8+515+d388b460)
CentOS Stream 8
AppStream

389-ds-base

1.4.3.32 Potentially vulnerable (1.4.3.32-1.module_el8.8.0+1253+f7ab6c12)
CentOS Stream 8
AppStream

389-ds-base

1.4.3.30 Potentially vulnerable (1.4.3.30-6.module_el8.7.0+1215+4ecf03c5)
CentOS Stream 8
AppStream

389-ds-base

1.4.3.28 Potentially vulnerable (1.4.3.28-6.module_el8.6.0+1102+fe5d910f)
CentOS Stream 8
AppStream

389-ds-base

1.4.3.23 Potentially vulnerable (1.4.3.23-10.module_el8.5.0+946+51aba098)
CentOS Stream 8
AppStream

389-ds-base

1.4.3.23 Potentially vulnerable (1.4.3.23-2.module_el8.5.0+835+5d54734c)
CentOS Stream 8
AppStream

389-ds-base

1.4.3.23 Potentially vulnerable (1.4.3.23-7.module_el8.5.0+889+90e0384f)
CentOS Stream 8
AppStream

389-ds-base

1.4.3.16 Potentially vulnerable (1.4.3.16-13.module_el8.4.0+804+98b1df0d)
CentOS Stream 8
AppStream

389-ds-base

1.4.3.16 Potentially vulnerable (1.4.3.16-16.module_el8.4.0+845+0c39e1b7)
CentOS Stream 8
AppStream

389-ds-base

1.4.3.16 Potentially vulnerable (1.4.3.16-8.module_el8.4.0+644+ed25d39e)
CentOS Stream 9
AppStream

389-ds-base

2.3.6 Potentially vulnerable (2.3.6-2.el9)
CentOS Stream 9
AppStream

389-ds-base

2.3.6 Potentially vulnerable (2.3.6-3.el9)
CentOS Stream 9
AppStream

389-ds-base

2.3.4 Potentially vulnerable (2.3.4-2.el9)
CentOS Stream 9
AppStream

389-ds-base

2.3.4 Potentially vulnerable (2.3.4-3.el9)
CentOS Stream 9
AppStream

389-ds-base

2.2.4 Potentially vulnerable (2.2.4-3.el9)
Deepin
main

389-ds-base

1.4.0.21.1 Potentially vulnerable (1.4.0.21.1-1+security)
Devuan 3.0
beowulf/main

389-ds-base

1.4.0.21 Potentially vulnerable (1.4.0.21-1)
Devuan 4.0
chimaera/main

389-ds-base

1.4.4.11 Potentially vulnerable (1.4.4.11-2+devuan0.1)
Devuan Unstable
unstable/main

389-ds-base

2.3.4 Potentially vulnerable (2.3.4+dfsg1-1)
EuroLinux 8
appstream

389-ds-base

1.4.3.35 Potentially vulnerable (1.4.3.35-2.module+el8.8.0+19693+b24f535c)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+ and ASL 2.0 and MIT
  • Link(s):
EuroLinux 8
appstream

389-ds-base

1.4.3.28 Potentially vulnerable (1.4.3.28-6.module+el8.6.0+14129+983ceada)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):
EuroLinux 8
appstream

389-ds-base

1.4.3.28 Potentially vulnerable (1.4.3.28-7.module+el8.6.0+15293+4900ec12)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):
EuroLinux 8
appstream

389-ds-base

1.4.3.28 Potentially vulnerable (1.4.3.28-8.module+el8.6.0+16880+945f9b53)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):
EuroLinux 8
appstream

389-ds-base

1.4.3.23 Potentially vulnerable (1.4.3.23-10.module+el8.5.0+12398+47000435)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):
EuroLinux 8
appstream

389-ds-base

1.4.3.23 Potentially vulnerable (1.4.3.23-12.module+el8.5.0+13329+4096c77a)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):
EuroLinux 8
appstream

389-ds-base

1.4.3.23 Potentially vulnerable (1.4.3.23-14.module+el8.5.0+14377+c731dc97)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):
EuroLinux 8
appstream

389-ds-base

1.4.3.16 Potentially vulnerable (1.4.3.16-16.module+el8.4.0+11446+fc96bc48)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):
EuroLinux 8
appstream

389-ds-base

1.4.3.16 Potentially vulnerable (1.4.3.16-19.module+el8.4.0+11894+f5bb5c43)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):
EuroLinux 8
appstream

389-ds-base

1.4.3.8 Potentially vulnerable (1.4.3.8-7.module+el8.3.0+10310+6e88d919)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):
EuroLinux 9
appstream

389-ds-base

2.3.6 Potentially vulnerable (2.3.6-3.el9_3)
  • Summary:
    389 Directory Server (base)
  • Category:
    • Unspecified
  • License:
    • GPLv3+ and MIT and ASL 2.0
  • Link(s):
EuroLinux 9
appstream

389-ds-base

2.2.4 Potentially vulnerable (2.2.4-3.el9)
  • Summary:
    389 Directory Server (base)
  • Category:
    • Unspecified
  • License:
    • GPLv3+ and (ASL 2.0 or MIT)
  • Link(s):
EuroLinux 9
appstream

389-ds-base

2.2.4 Potentially vulnerable (2.2.4-5.el9_2)
  • Summary:
    389 Directory Server (base)
  • Category:
    • Unspecified
  • License:
    • GPLv3+ and (ASL 2.0 or MIT)
  • Link(s):
EuroLinux 9
appstream

389-ds-base

2.1.3 Potentially vulnerable (2.1.3-3.el9)
  • Summary:
    389 Directory Server (base)
  • Category:
    • Unspecified
  • License:
    • GPLv3+ and (ASL 2.0 or MIT)
  • Link(s):
EuroLinux 9
appstream

389-ds-base

2.1.3 Potentially vulnerable (2.1.3-4.el9_1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • Unspecified
  • License:
    • GPLv3+ and (ASL 2.0 or MIT)
  • Link(s):
EuroLinux 9
appstream

389-ds-base

2.0.14 Potentially vulnerable (2.0.14-1.el9)
  • Summary:
    389 Directory Server (base)
  • Category:
    • Unspecified
  • License:
    • GPLv3+ and ASL 2.0
  • Link(s):

389-ds-base

2.0.14 Potentially vulnerable (2.0.14-1.el9)
  • Summary:
    389 Directory Server (base)
  • Category:
    • Unspecified
  • License:
    • GPLv3+ and ASL 2.0
  • Link(s):
EuroLinux 9
appstream

389-ds-base

2.0.11 Potentially vulnerable (2.0.11-3.el9)
  • Summary:
    389 Directory Server (base)
  • Category:
    • Unspecified
  • License:
    • GPLv3+ and ASL 2.0 and MPLv2.0 and Boost
  • Link(s):
Fedora 26
updates

389-ds-base

1.3.6.15 Potentially vulnerable (1.3.6.15-1.fc26)
Fedora 26
release

389-ds-base

1.3.6.6 Potentially vulnerable (1.3.6.6-2.fc26)
Fedora 27
updates

389-ds-base

1.3.9.0 Potentially vulnerable (1.3.9.0-1.fc27)
Fedora 27
release

389-ds-base

1.3.7.3 Potentially vulnerable (1.3.7.3-1.fc27)
Fedora 28
updates

389-ds-base

1.4.0.22 Potentially vulnerable (1.4.0.22-1.fc28)
Fedora 28
release

389-ds-base

1.4.0.6 Potentially vulnerable (1.4.0.6-2.fc28)
Fedora 29
updates

389-ds-base

1.4.0.31 Potentially vulnerable (1.4.0.31-1.fc29)
Fedora 29
release

389-ds-base

1.4.0.16 Potentially vulnerable (1.4.0.16-1.fc29)
Fedora 30
updates

389-ds-base

1.4.1.19 Potentially vulnerable (1.4.1.19-1.fc30)
Fedora 30
release

389-ds-base

1.4.1.2 Potentially vulnerable (1.4.1.2-2.fc30)
Fedora 31
updates

389-ds-base

1.4.2.16 Potentially vulnerable (1.4.2.16-1.fc31)
Fedora 31
release

389-ds-base

1.4.1.8 Potentially vulnerable (1.4.1.8-3.fc31)
Fedora 32
updates

389-ds-base

1.4.3.23 Potentially vulnerable (1.4.3.23-1.fc32)
Fedora 32
release

389-ds-base

1.4.3.3 Potentially vulnerable (1.4.3.3-3.fc32)
Fedora 33
updates

389-ds-base

1.4.4.17 Potentially vulnerable (1.4.4.17-1.fc33)
Fedora 33
release

389-ds-base

1.4.4.4 Potentially vulnerable (1.4.4.4-1.fc33.2)
Fedora 34
updates

389-ds-base

2.0.15 Potentially vulnerable (2.0.15-1.fc34)
Fedora 34
release

389-ds-base

2.0.3 Potentially vulnerable (2.0.3-3.fc34)
Fedora 35
updates

389-ds-base

2.0.17 Potentially vulnerable (2.0.17-1.fc35)
Fedora 35
release

389-ds-base

2.0.10 Potentially vulnerable (2.0.10-1.fc35)
Fedora 36
updates

389-ds-base

2.1.8 Potentially vulnerable (2.1.8-1.fc36)
Fedora 36
release

389-ds-base

2.1.1 Potentially vulnerable (2.1.1-1.fc36)
Fedora 37
updates

389-ds-base

2.2.9 Potentially vulnerable (2.2.9-1.fc37)
Fedora 37
release

389-ds-base

2.2.3 Potentially vulnerable (2.2.3-1.fc37)
Fedora 38
updates

389-ds-base

2.3.7 Potentially vulnerable (2.3.7-2.fc38)
Fedora 38
release

389-ds-base

2.3.2 Potentially vulnerable (2.3.2-2.fc38)
Fedora 39
updates

389-ds-base

2.4.4 (2.4.4-1.fc39)
Fedora 39
development

389-ds-base

2.4.3 (2.4.3-1.fc39)
Fedora Rawhide
development

389-ds-base

2.4.3 (2.4.3-1.fc39)

net-nds/389-ds-base

2.3.2 Potentially vulnerable

net-nds/389-ds-base

2.1.0 Potentially vulnerable (2.1.0-r4)

net-nds/389-ds-base

1.4.4.19 Potentially vulnerable (1.4.4.19-r4)

389-ds-base

2.2.2 Potentially vulnerable

net-nds/389-ds-base

2.3.2 Potentially vulnerable

net-nds/389-ds-base

2.1.0 Potentially vulnerable (2.1.0-r4)

net-nds/389-ds-base

1.4.4.19 Potentially vulnerable (1.4.4.19-r4)

net-nds/389-ds-base

2.3.2 Potentially vulnerable

net-nds/389-ds-base

2.1.0 Potentially vulnerable (2.1.0-r4)

net-nds/389-ds-base

1.4.4.19 Potentially vulnerable (1.4.4.19-r4)
Mageia 8
core/updates

389-ds-base

1.4.0.26 Potentially vulnerable (1.4.0.26-8.1.mga8)
Mageia 8
core/updates

389-ds-base

1.4.0.26 Potentially vulnerable (1.4.0.26-8.2.mga8)
Mageia 8
core/updates

389-ds-base

1.4.0.26 Potentially vulnerable (1.4.0.26-8.4.mga8)
Mageia 8
core/updates

389-ds-base

1.4.0.26 Potentially vulnerable (1.4.0.26-8.5.mga8)
Mageia 8
core/release

389-ds-base

1.4.0.26 Potentially vulnerable (1.4.0.26-8.mga8)
Mageia 8
core/updates

389-ds-base

1.4.0.26 Potentially vulnerable (1.4.0.26-8.6.mga8)
Mageia cauldron
core/release

389-ds-base

1.4.0.26 Potentially vulnerable (1.4.0.26-18.mga10)

389-ds-base

2.4.3 (2.4.3-1)

389-ds-base

2.4.3 (2.4.3-1)

389-ds-base

2.4.3 (2.4.3-1)

389-ds-base

2.0.7 Potentially vulnerable

389-ds-base

2.0.7 Potentially vulnerable

389-ds-base

2.3.0 Potentially vulnerable

389-ds-base

2.3.1 Potentially vulnerable

389-ds-base

2.4.3

389-ds-base

1.4.3.20 Potentially vulnerable (1.4.3.20-1.oe2203)
Parabola
extra

389-ds-base

2.4.3 (2.4.3-1)

389-ds-base

1.4.4.11 Potentially vulnerable (1.4.4.11-2)
Parrot
parrot-updates/main

389-ds-base

1.4.4.11 Potentially vulnerable (1.4.4.11-2)
Parrot
parrot/main

389-ds-base

1.4.4.11 Potentially vulnerable (1.4.4.11-2)

389-ds-base

1.4.0.21 Potentially vulnerable (1.4.0.21-1)

389-ds-base

2.3.1 Potentially vulnerable (2.3.1+dfsg1-1)

389-ds-base

1.4.4.11 Potentially vulnerable (1.4.4.11-2+rpi1)

389-ds-base

2.3.1 Potentially vulnerable (2.3.1+dfsg1-1+rpi1)

389-ds-base

2.3.1 Potentially vulnerable (2.3.1+dfsg1-1+rpi1)
Rocky Linux 8
AppStream

389-ds-base

1.4.3.37 Potentially vulnerable (1.4.3.37-1.module+el8.9.0+1432+68ad6ce0)
Rocky Linux 9
AppStream

389-ds-base

2.3.6 Potentially vulnerable (2.3.6-3.el9_3)

389-ds-base

2.3.6 Potentially vulnerable (2.3.6-3.el9_3)
Rosa 2016.1
contrib/updates

389-ds-base

1.4.1.1 Potentially vulnerable (1.4.1.1-8)
Rosa 2021.1
main/release

389-ds-base

1.4.4.4 Potentially vulnerable (1.4.4.4-16)
Rosa 2021.1
contrib/release

389-ds-base

1.4.1.1 Potentially vulnerable (1.4.1.1-8)
Rosa Server 6.9
base/release

389-ds-base

1.2.11.15 Potentially vulnerable (1.2.11.15-62.res6)
Rosa Server 6.9
base/release

389-ds-base

1.2.11.15 Potentially vulnerable (1.2.11.15-69.res6)
Rosa Server 6.9
base/release

389-ds-base

1.2.11.15 Potentially vulnerable (1.2.11.15-74.res6)
Rosa Server 6.9
base/release

389-ds-base

1.2.11.15 Potentially vulnerable (1.2.11.15-91.res6)
Rosa Server 7.3
base/release

389-ds-base

1.3.5.10 Potentially vulnerable (1.3.5.10-21.res7)
Rosa Server 7.5
base/release

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-18.res7)
Rosa Server 7.5
base/release

389-ds-base

1.3.5.10 Potentially vulnerable (1.3.5.10-21.res7)

389-ds-base

1.3.11.1 Potentially vulnerable (1.3.11.1-1.el7_9)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.11.1 Potentially vulnerable (1.3.11.1-2.el7_9)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.11.1 Potentially vulnerable (1.3.11.1-3.el7_9)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-16.el7_9)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-10.el7_9)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-12.el7_9)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-13.el7_9)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-14.el7_9)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-15.el7_9)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-17.el7_9)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-6.el7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-7.1.el7_9)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-8.el7_9)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-9.el7_9)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.10.1 Potentially vulnerable (1.3.10.1-14.el7_8)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.10.1 Potentially vulnerable (1.3.10.1-5.el7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.10.1 Potentially vulnerable (1.3.10.1-9.el7_8)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.9.1 Potentially vulnerable (1.3.9.1-10.el7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.9.1 Potentially vulnerable (1.3.9.1-12.el7_7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.9.1 Potentially vulnerable (1.3.9.1-13.el7_7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.8.4 Potentially vulnerable (1.3.8.4-15.el7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.8.4 Potentially vulnerable (1.3.8.4-18.el7_6)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.8.4 Potentially vulnerable (1.3.8.4-22.el7_6)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.8.4 Potentially vulnerable (1.3.8.4-23.el7_6)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.8.4 Potentially vulnerable (1.3.8.4-25.1.el7_6)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-18.el7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-19.el7_5)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-21.el7_5)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-24.el7_5)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-25.el7_5)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-28.el7_5)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-16.el7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-19.el7_4)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-21.el7_4)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-24.el7_4)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-26.el7_4)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-28.el7_4)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-29.el7_4)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.5.10 Potentially vulnerable (1.3.5.10-11.el7)

389-ds-base

1.3.5.10 Potentially vulnerable (1.3.5.10-12.el7_3)

389-ds-base

1.3.5.10 Potentially vulnerable (1.3.5.10-15.el7_3)

389-ds-base

1.3.5.10 Potentially vulnerable (1.3.5.10-18.el7_3)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.5.10 Potentially vulnerable (1.3.5.10-20.el7_3)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.5.10 Potentially vulnerable (1.3.5.10-21.el7_3)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Link(s):

389-ds-base

1.3.4.0 Potentially vulnerable (1.3.4.0-19.el7)

389-ds-base

1.3.4.0 Potentially vulnerable (1.3.4.0-21.el7_2)

389-ds-base

1.3.4.0 Potentially vulnerable (1.3.4.0-26.el7_2)

389-ds-base

1.3.4.0 Potentially vulnerable (1.3.4.0-29.el7_2)

389-ds-base

1.3.4.0 Potentially vulnerable (1.3.4.0-30.el7_2)

389-ds-base

1.3.4.0 Potentially vulnerable (1.3.4.0-32.el7_2)

389-ds-base

1.3.4.0 Potentially vulnerable (1.3.4.0-33.el7_2)

389-ds-base

1.3.3.1 Potentially vulnerable (1.3.3.1-13.el7)

389-ds-base

1.3.3.1 Potentially vulnerable (1.3.3.1-15.el7_1)

389-ds-base

1.3.3.1 Potentially vulnerable (1.3.3.1-16.el7_1)

389-ds-base

1.3.3.1 Potentially vulnerable (1.3.3.1-20.el7_1)

389-ds-base

1.3.3.1 Potentially vulnerable (1.3.3.1-23.el7_1)

389-ds-base

1.3.1.6 Potentially vulnerable (1.3.1.6-10.el7)

389-ds-base

1.3.1.6 Potentially vulnerable (1.3.1.6-25.el7)

389-ds-base

1.3.1.6 Potentially vulnerable (1.3.1.6-26.el7_0)
Trisquel 10.0
nabia/main

389-ds-base

1.4.3.6 Potentially vulnerable (1.4.3.6-2)
Trisquel 11.0
aramo/main

389-ds-base

2.0.15 Potentially vulnerable (2.0.15-1)
Ubuntu 18.04
bionic/universe

389-ds-base

1.3.7.10 Potentially vulnerable (1.3.7.10-1ubuntu1)

389 Directory Server

2.4.4