Versions Packages Information History CVEs Related Badges Report

Packages for 389-ds-base

178 package(s) known

AlmaLinux 8
AppStream

389-ds-base

1.4.3.16 (1.4.3.16-13.module_el8.4.0+2330+74bbfb4e)
AlmaLinux 8
AppStream

389-ds-base

1.4.3.16 (1.4.3.16-16.module_el8.4.0+2505+fc96bc48)
AlmaLinux 8
AppStream

389-ds-base

1.4.3.16 (1.4.3.16-19.module_el8.4.0+2517+f5bb5c43)

389-ds-base

1.4.1.18 (1.4.1.18-alt5)

389-ds-base

1.4.3.25 (1.4.3.25-alt1)

389-ds-base

1.4.3.25 (1.4.3.25-alt1)

389-ds-base

1.3.9.1 Potentially vulnerable (1.3.9.1-12.65.amzn1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.8.4 Potentially vulnerable (1.3.8.4-25.1.62.amzn1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.8.4 Potentially vulnerable (1.3.8.4-18.60.amzn1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-21.56.amzn1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-28.58.amzn1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-28.54.amzn1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-12.amzn2.0.1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.9.1 Potentially vulnerable (1.3.9.1-12.amzn2.0.1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.8.4 Potentially vulnerable (1.3.8.4-15.amzn2.0.1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.8.4 Potentially vulnerable (1.3.8.4-25.1.amzn2.0.1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-21.amzn2.0.1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-21.amzn2.0.2)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-28.amzn2.0.1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-21.amzn2.0.1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-28.amzn2.0.1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-26.amzn2.0.1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):
Arch
extra

389-ds-base

2.0.10 (2.0.10-1)

389-ds-base

1.3.10.1 Potentially vulnerable (1.3.10.1-astra7)

389-ds-base

1.3.10.1 Potentially vulnerable (1.3.10.1-astra7)

389-ds-base

1.2.11.15 Potentially vulnerable (1.2.11.15-95.el6_9)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Links(s):
CentOS 6
updates

389-ds-base

1.2.11.15 Potentially vulnerable (1.2.11.15-97.el6_10)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Links(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-6.el7)
CentOS 7
updates

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-10.el7_9)
CentOS 7
updates

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-12.el7_9)
CentOS 7
updates

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-13.el7_9)
CentOS 7
updates

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-7.1.el7_9)
CentOS 7
updates

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-8.el7_9)
CentOS 7
updates

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-9.el7_9)
CentOS 8
AppStream

389-ds-base

1.4.3.16 (1.4.3.16-13.module_el8.4.0+804+98b1df0d)
CentOS 8
AppStream

389-ds-base

1.4.3.16 (1.4.3.16-16.module_el8.4.0+845+0c39e1b7)
CentOS 8
AppStream

389-ds-base

1.4.3.16 (1.4.3.16-16.module_el8.4.0+856+96fc9be8.0.1)
CentOS 8
AppStream

389-ds-base

1.4.3.16 (1.4.3.16-16.module_el8.4.0+857+7e200964.0.2)
CentOS 8
AppStream

389-ds-base

1.4.3.16 (1.4.3.16-19.module_el8.4.0+884+e9b25896)
Deepin
main

389-ds-base

1.4.0.21.1 Potentially vulnerable (1.4.0.21.1-1+security)

389-ds-base

1.4.0.21 Potentially vulnerable (1.4.0.21-1)
Devuan 4.0 (Chimaera)
chimaera/main

389-ds-base

1.4.4.11 (1.4.4.11-2+devuan0.1)
Devuan Unstable
unstable/main

389-ds-base

1.4.4.11 (1.4.4.11-2+devuan0.1)
Fedora 26
updates

389-ds-base

1.3.6.15 Potentially vulnerable (1.3.6.15-1.fc26)
Fedora 26
release

389-ds-base

1.3.6.6 Potentially vulnerable (1.3.6.6-2.fc26)
Fedora 27
updates

389-ds-base

1.3.9.0 Potentially vulnerable (1.3.9.0-1.fc27)
Fedora 27
release

389-ds-base

1.3.7.3 Potentially vulnerable (1.3.7.3-1.fc27)
Fedora 28
updates

389-ds-base

1.4.0.22 Potentially vulnerable (1.4.0.22-1.fc28)
Fedora 28
release

389-ds-base

1.4.0.6 Potentially vulnerable (1.4.0.6-2.fc28)
Fedora 29
updates

389-ds-base

1.4.0.31 Potentially vulnerable (1.4.0.31-1.fc29)
Fedora 29
release

389-ds-base

1.4.0.16 Potentially vulnerable (1.4.0.16-1.fc29)
Fedora 30
updates

389-ds-base

1.4.1.19 (1.4.1.19-1.fc30)
Fedora 30
release

389-ds-base

1.4.1.2 Potentially vulnerable (1.4.1.2-2.fc30)
Fedora 31
updates

389-ds-base

1.4.2.16 (1.4.2.16-1.fc31)
Fedora 31
release

389-ds-base

1.4.1.8 (1.4.1.8-3.fc31)
Fedora 32
updates

389-ds-base

1.4.3.23 (1.4.3.23-1.fc32)
Fedora 32
release

389-ds-base

1.4.3.3 (1.4.3.3-3.fc32)
Fedora 33
updates

389-ds-base

1.4.4.17 (1.4.4.17-1.fc33)
Fedora 33
release

389-ds-base

1.4.4.4 (1.4.4.4-1.fc33.2)
Fedora 34
updates

389-ds-base

2.0.10 (2.0.10-1.fc34)
Fedora 34
release

389-ds-base

2.0.3 (2.0.3-3.fc34)
Fedora 35
development

389-ds-base

2.0.10 (2.0.10-1.fc35)

389-ds-base

2.0.10 (2.0.10-1.fc36)
Funtoo 1.4
net-kit

net-nds/389-ds-base

9999
Funtoo 1.4
net-kit

net-nds/389-ds-base

1.3.6.8 Potentially vulnerable (1.3.6.8-r1)
Funtoo 1.4
net-kit

net-nds/389-ds-base

1.3.5.19 Potentially vulnerable

net-nds/389-ds-base

1.4.4.17

389-ds-base

1.4.0.31 Potentially vulnerable

net-nds/389-ds-base

1.4.4.17

net-nds/389-ds-base

1.4.4.17
Mageia 7
core/updates

389-ds-base

1.4.0.26 Potentially vulnerable (1.4.0.26-1.1.mga7)
Mageia 7
core/release

389-ds-base

1.4.0.18 Potentially vulnerable (1.4.0.18-4.mga7)
Mageia 8
core/updates

389-ds-base

1.4.0.26 Potentially vulnerable (1.4.0.26-8.1.mga8)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System/Servers
  • License:
    • GPLv3+
  • Links(s):
Mageia 8
core/release

389-ds-base

1.4.0.26 Potentially vulnerable (1.4.0.26-8.mga8)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System/Servers
  • License:
    • GPLv3+
  • Links(s):
Mageia Cauldron
core/release

389-ds-base

1.4.0.26 Potentially vulnerable (1.4.0.26-10.mga9)

389-ds-base

2.0.10 (2.0.10-1)

389-ds-base

2.0.10 (2.0.10-1)

389-ds-base

2.0.10 (2.0.10-1)

389-ds-base

2.0.10 (2.0.10-1)

389-ds-base

1.3.9.1 Potentially vulnerable

389-ds-base

2.0.7
Parabola
extra

389-ds-base

2.0.10 (2.0.10-1)

389-ds-base

1.4.0.21 Potentially vulnerable (1.4.0.21-1)

389-ds-base

1.4.4.11 (1.4.4.11-2)
Parrot
main

389-ds-base

1.4.4.11 (1.4.4.11-2)

389-ds-base

1.4.0.21 Potentially vulnerable (1.4.0.21-1)

389-ds-base

1.4.4.11 (1.4.4.11-2)

389-ds-base

1.4.0.21 Potentially vulnerable (1.4.0.21-1+rpi1)

389-ds-base

1.4.4.11 (1.4.4.11-2+rpi1)

389-ds-base

1.4.4.16 (1.4.4.16-1+rpi1)
Rocky Linux 8
AppStream

389-ds-base

1.4.3.16 (1.4.3.16-13.module+el8.4.0+398+d030ca25)
Rocky Linux 8
AppStream

389-ds-base

1.4.3.16 (1.4.3.16-16.module+el8.4.0+596+159889e5)
Rocky Linux 8
AppStream

389-ds-base

1.4.3.16 (1.4.3.16-19.module+el8.4.0+636+837ee950)
Rosa 2016.1
contrib/updates

389-ds-base

1.4.1.1 Potentially vulnerable (1.4.1.1-8)
Rosa 2019.1
main/release

389-ds-base

1.4.4.4 (1.4.4.4-6)
Rosa 2019.1
contrib/release

389-ds-base

1.4.1.1 Potentially vulnerable (1.4.1.1-8)
Rosa Server 6.9
base/release

389-ds-base

1.2.11.15 Potentially vulnerable (1.2.11.15-62.res6)
Rosa Server 6.9
base/release

389-ds-base

1.2.11.15 Potentially vulnerable (1.2.11.15-69.res6)
Rosa Server 6.9
base/release

389-ds-base

1.2.11.15 Potentially vulnerable (1.2.11.15-74.res6)
Rosa Server 6.9
base/release

389-ds-base

1.2.11.15 Potentially vulnerable (1.2.11.15-91.res6)
Rosa Server 7.3
base/release

389-ds-base

1.3.5.10 Potentially vulnerable (1.3.5.10-21.res7)
Rosa Server 7.5
base/release

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-18.res7)
Rosa Server 7.5
base/release

389-ds-base

1.3.5.10 Potentially vulnerable (1.3.5.10-21.res7)

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-10.el7_9)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-12.el7_9)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-13.el7_9)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-6.el7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-7.1.el7_9)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-8.el7_9)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-9.el7_9)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.10.1 Potentially vulnerable (1.3.10.1-14.el7_8)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.10.1 Potentially vulnerable (1.3.10.1-5.el7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.10.1 Potentially vulnerable (1.3.10.1-9.el7_8)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.9.1 Potentially vulnerable (1.3.9.1-10.el7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.9.1 Potentially vulnerable (1.3.9.1-12.el7_7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.9.1 Potentially vulnerable (1.3.9.1-13.el7_7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.8.4 Potentially vulnerable (1.3.8.4-15.el7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.8.4 Potentially vulnerable (1.3.8.4-18.el7_6)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.8.4 Potentially vulnerable (1.3.8.4-22.el7_6)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.8.4 Potentially vulnerable (1.3.8.4-23.el7_6)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.8.4 Potentially vulnerable (1.3.8.4-25.1.el7_6)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-18.el7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-19.el7_5)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-21.el7_5)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-24.el7_5)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-25.el7_5)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-28.el7_5)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-16.el7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-19.el7_4)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-21.el7_4)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-24.el7_4)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-26.el7_4)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-28.el7_4)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-29.el7_4)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.5.10 Potentially vulnerable (1.3.5.10-11.el7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.5.10 Potentially vulnerable (1.3.5.10-12.el7_3)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.5.10 Potentially vulnerable (1.3.5.10-15.el7_3)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.5.10 Potentially vulnerable (1.3.5.10-18.el7_3)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.5.10 Potentially vulnerable (1.3.5.10-20.el7_3)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.5.10 Potentially vulnerable (1.3.5.10-21.el7_3)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.4.0 Potentially vulnerable (1.3.4.0-19.el7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Links(s):

389-ds-base

1.3.4.0 Potentially vulnerable (1.3.4.0-21.el7_2)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Links(s):

389-ds-base

1.3.4.0 Potentially vulnerable (1.3.4.0-26.el7_2)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Links(s):

389-ds-base

1.3.4.0 Potentially vulnerable (1.3.4.0-29.el7_2)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.4.0 Potentially vulnerable (1.3.4.0-30.el7_2)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.4.0 Potentially vulnerable (1.3.4.0-32.el7_2)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.4.0 Potentially vulnerable (1.3.4.0-33.el7_2)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Links(s):

389-ds-base

1.3.3.1 Potentially vulnerable (1.3.3.1-13.el7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Links(s):

389-ds-base

1.3.3.1 Potentially vulnerable (1.3.3.1-15.el7_1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Links(s):

389-ds-base

1.3.3.1 Potentially vulnerable (1.3.3.1-16.el7_1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Links(s):

389-ds-base

1.3.3.1 Potentially vulnerable (1.3.3.1-20.el7_1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Links(s):

389-ds-base

1.3.3.1 Potentially vulnerable (1.3.3.1-23.el7_1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Links(s):

389-ds-base

1.3.1.6 Potentially vulnerable (1.3.1.6-10.el7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Links(s):

389-ds-base

1.3.1.6 Potentially vulnerable (1.3.1.6-25.el7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Links(s):

389-ds-base

1.3.1.6 Potentially vulnerable (1.3.1.6-26.el7_0)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Links(s):
Trisquel 6.0
toutatis-updates/main

389-ds-base

1.2.10.4 Potentially vulnerable (1.2.10.4-0ubuntu3.1)
Trisquel 6.0
toutatis/main

389-ds-base

1.2.10.4 Potentially vulnerable (1.2.10.4-0ubuntu3)
Trisquel 7.0
belenos/main

389-ds-base

1.3.2.16 Potentially vulnerable (1.3.2.16-0ubuntu1)
Trisquel 8.0
flidas/main

389-ds-base

1.3.4.9 Potentially vulnerable (1.3.4.9-1)
Trisquel 9.0
etiona/main

389-ds-base

1.3.7.10 Potentially vulnerable (1.3.7.10-1ubuntu1)
Trisquel 10.0
nabia/main

389-ds-base

1.4.3.6 (1.4.3.6-2)
Ubuntu 18.04
bionic/universe

389-ds-base

1.3.7.10 Potentially vulnerable (1.3.7.10-1ubuntu1)
Ubuntu 20.10
groovy/universe

389-ds-base

1.4.4.3 (1.4.4.3-1build1)
Ubuntu 21.10
impish/universe

389-ds-base

1.4.4.11 (1.4.4.11-2build1)

389 Directory Server

1.4.4.14