Versions Packages Information History CVEs Related Badges Report

Packages for 389-ds-base

155 package(s) known

389-ds-base

1.4.1.18 (1.4.1.18-alt5)

389-ds-base

1.4.1.18 (1.4.1.18-alt5)

389-ds-base

1.3.9.1 Potentially vulnerable (1.3.9.1-12.65.amzn1)

389-ds-base

1.3.8.4 Potentially vulnerable (1.3.8.4-25.1.62.amzn1)

389-ds-base

1.3.8.4 Potentially vulnerable (1.3.8.4-18.60.amzn1)

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-21.56.amzn1)

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-28.58.amzn1)

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-28.54.amzn1)

389-ds-base

1.3.9.1 Potentially vulnerable (1.3.9.1-12.amzn2.0.1)

389-ds-base

1.3.8.4 Potentially vulnerable (1.3.8.4-25.1.amzn2.0.1)

389-ds-base

1.3.8.4 Potentially vulnerable (1.3.8.4-15.amzn2.0.1)

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-28.amzn2.0.1)

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-21.amzn2.0.2)

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-21.amzn2.0.1)

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-28.amzn2.0.1)

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-26.amzn2.0.1)

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-21.amzn2.0.1)
Arch
extra

389-ds-base

1.4.4.4 (1.4.4.4-5)

389-ds-base

1.3.10.1 Potentially vulnerable (1.3.10.1-astra7)

389-ds-base

1.3.10.1 Potentially vulnerable (1.3.10.1-astra7)

389-ds-base

1.2.11.15 Potentially vulnerable (1.2.11.15-95.el6_9)
CentOS 6
updates

389-ds-base

1.2.11.15 Potentially vulnerable (1.2.11.15-97.el6_10)

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-6.el7)
CentOS 7
updates

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-7.1.el7_9)
CentOS 7
updates

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-8.el7_9)
CentOS 8
AppStream

389-ds-base

1.4.2.4 (1.4.2.4-10.module_el8.2.0+489+38ed056a)
CentOS 8
AppStream

389-ds-base

1.4.2.4 (1.4.2.4-8.module_el8.2.0+366+71e3276f)
Deepin
main

389-ds-base

1.4.0.21 Potentially vulnerable (1.4.0.21-1)

389-ds-base

1.4.0.21 Potentially vulnerable (1.4.0.21-1)
Devuan 4.0 (Chimaera)
chimaera/main

389-ds-base

1.4.4.9 (1.4.4.9-1+devuan1)
Devuan Unstable
unstable/main

389-ds-base

1.4.4.9 (1.4.4.9-1+devuan1)
Fedora 26
updates

389-ds-base

1.3.6.15 Potentially vulnerable (1.3.6.15-1.fc26)
Fedora 26
release

389-ds-base

1.3.6.6 Potentially vulnerable (1.3.6.6-2.fc26)
Fedora 27
updates

389-ds-base

1.3.9.0 Potentially vulnerable (1.3.9.0-1.fc27)
Fedora 27
release

389-ds-base

1.3.7.3 Potentially vulnerable (1.3.7.3-1.fc27)
Fedora 28
updates

389-ds-base

1.4.0.22 Potentially vulnerable (1.4.0.22-1.fc28)
Fedora 28
release

389-ds-base

1.4.0.6 Potentially vulnerable (1.4.0.6-2.fc28)
Fedora 29
updates

389-ds-base

1.4.0.31 Potentially vulnerable (1.4.0.31-1.fc29)
Fedora 29
release

389-ds-base

1.4.0.16 Potentially vulnerable (1.4.0.16-1.fc29)
Fedora 30
updates

389-ds-base

1.4.1.19 (1.4.1.19-1.fc30)
Fedora 30
release

389-ds-base

1.4.1.2 Potentially vulnerable (1.4.1.2-2.fc30)
Fedora 31
updates

389-ds-base

1.4.2.16 (1.4.2.16-1.fc31)
Fedora 31
release

389-ds-base

1.4.1.8 (1.4.1.8-3.fc31)
Fedora 32
updates

389-ds-base

1.4.3.16 (1.4.3.16-1.fc32)
Fedora 32
release

389-ds-base

1.4.3.3 (1.4.3.3-3.fc32)
Fedora 33
updates

389-ds-base

1.4.4.9 (1.4.4.9-1.fc33)
Fedora 33
release

389-ds-base

1.4.4.4 (1.4.4.4-1.fc33.2)

389-ds-base

2.0.1 (2.0.1-1.fc34)
Funtoo 1.4
net-kit

net-nds/389-ds-base

9999
Funtoo 1.4
net-kit

net-nds/389-ds-base

1.3.6.8 Potentially vulnerable (1.3.6.8-r1)
Funtoo 1.4
net-kit

net-nds/389-ds-base

1.3.5.19 Potentially vulnerable

389-ds-base

1.4.0.21 Potentially vulnerable

389-ds-base

1.4.4.9 (1.4.4.9-1)
Mageia 6
core/release

389-ds-base

1.3.5.17 Potentially vulnerable (1.3.5.17-1.mga6)
Mageia 6
core/updates

389-ds-base

1.3.5.17 Potentially vulnerable (1.3.5.17-1.1.mga6)
Mageia 6
core/updates

389-ds-base

1.3.5.17 Potentially vulnerable (1.3.5.17-1.2.mga6)
Mageia 6
core/updates

389-ds-base

1.3.5.17 Potentially vulnerable (1.3.5.17-1.3.mga6)
Mageia 6
core/updates

389-ds-base

1.3.5.17 Potentially vulnerable (1.3.5.17-1.4.mga6)
Mageia 6
core/updates

389-ds-base

1.3.5.17 Potentially vulnerable (1.3.5.17-1.5.mga6)
Mageia 6
core/updates

389-ds-base

1.3.5.17 Potentially vulnerable (1.3.5.17-1.6.mga6)
Mageia 6
core/updates

389-ds-base

1.3.5.17 Potentially vulnerable (1.3.5.17-1.7.mga6)
Mageia 7
core/updates

389-ds-base

1.4.0.26 Potentially vulnerable (1.4.0.26-1.1.mga7)
Mageia 7
core/release

389-ds-base

1.4.0.18 Potentially vulnerable (1.4.0.18-4.mga7)
Mageia Cauldron
core/release

389-ds-base

1.4.0.26 Potentially vulnerable (1.4.0.26-8.mga8)

389-ds-base

1.4.4.4 (1.4.4.4-4)

389-ds-base

1.4.4.4 (1.4.4.4-5)

389-ds-base

1.4.4.4 (1.4.4.4-5)

389-ds-base

1.3.9.1 Potentially vulnerable

389-ds-base

1.3.9.1 Potentially vulnerable
Parabola
extra

389-ds-base

1.4.4.4 (1.4.4.4-5)

389-ds-base

1.4.0.21 Potentially vulnerable (1.4.0.21-1)
Parrot
main

389-ds-base

1.4.4.9 (1.4.4.9-1)

389-ds-base

1.4.0.21 Potentially vulnerable (1.4.0.21-1)

389-ds-base

1.4.4.9 (1.4.4.9-1)

389-ds-base

1.4.0.21 Potentially vulnerable (1.4.0.21-1+rpi1)

389-ds-base

1.4.4.9 (1.4.4.9-1+rpi1)
Rosa 2016.1
contrib/updates

389-ds-base

1.4.1.1 Potentially vulnerable (1.4.1.1-8)
Rosa 2019.1
main/release

389-ds-base

1.4.4.4 (1.4.4.4-6)
Rosa 2019.1
contrib/release

389-ds-base

1.4.1.1 Potentially vulnerable (1.4.1.1-8)
Rosa Server 6.9
base/release

389-ds-base

1.2.11.15 Potentially vulnerable (1.2.11.15-62.res6)
Rosa Server 6.9
base/release

389-ds-base

1.2.11.15 Potentially vulnerable (1.2.11.15-69.res6)
Rosa Server 6.9
base/release

389-ds-base

1.2.11.15 Potentially vulnerable (1.2.11.15-74.res6)
Rosa Server 6.9
base/release

389-ds-base

1.2.11.15 Potentially vulnerable (1.2.11.15-91.res6)
Rosa Server 7.3
base/release

389-ds-base

1.3.5.10 Potentially vulnerable (1.3.5.10-21.res7)
Rosa Server 7.5
base/release

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-18.res7)
Rosa Server 7.5
base/release

389-ds-base

1.3.5.10 Potentially vulnerable (1.3.5.10-21.res7)

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-6.el7)

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-7.1.el7_9)

389-ds-base

1.3.10.2 Potentially vulnerable (1.3.10.2-8.el7_9)

389-ds-base

1.3.10.1 Potentially vulnerable (1.3.10.1-14.el7_8)

389-ds-base

1.3.10.1 Potentially vulnerable (1.3.10.1-5.el7)

389-ds-base

1.3.10.1 Potentially vulnerable (1.3.10.1-9.el7_8)

389-ds-base

1.3.9.1 Potentially vulnerable (1.3.9.1-10.el7)

389-ds-base

1.3.9.1 Potentially vulnerable (1.3.9.1-12.el7_7)

389-ds-base

1.3.9.1 Potentially vulnerable (1.3.9.1-13.el7_7)

389-ds-base

1.3.8.4 Potentially vulnerable (1.3.8.4-15.el7)

389-ds-base

1.3.8.4 Potentially vulnerable (1.3.8.4-18.el7_6)

389-ds-base

1.3.8.4 Potentially vulnerable (1.3.8.4-22.el7_6)

389-ds-base

1.3.8.4 Potentially vulnerable (1.3.8.4-23.el7_6)

389-ds-base

1.3.8.4 Potentially vulnerable (1.3.8.4-25.1.el7_6)

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-18.el7)

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-19.el7_5)

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-21.el7_5)

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-24.el7_5)

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-25.el7_5)

389-ds-base

1.3.7.5 Potentially vulnerable (1.3.7.5-28.el7_5)

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-16.el7)

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-19.el7_4)

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-21.el7_4)

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-24.el7_4)

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-26.el7_4)

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-28.el7_4)

389-ds-base

1.3.6.1 Potentially vulnerable (1.3.6.1-29.el7_4)

389-ds-base

1.3.5.10 Potentially vulnerable (1.3.5.10-11.el7)

389-ds-base

1.3.5.10 Potentially vulnerable (1.3.5.10-12.el7_3)

389-ds-base

1.3.5.10 Potentially vulnerable (1.3.5.10-15.el7_3)

389-ds-base

1.3.5.10 Potentially vulnerable (1.3.5.10-18.el7_3)

389-ds-base

1.3.5.10 Potentially vulnerable (1.3.5.10-20.el7_3)

389-ds-base

1.3.5.10 Potentially vulnerable (1.3.5.10-21.el7_3)

389-ds-base

1.3.4.0 Potentially vulnerable (1.3.4.0-19.el7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Homepage:

389-ds-base

1.3.4.0 Potentially vulnerable (1.3.4.0-21.el7_2)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Homepage:

389-ds-base

1.3.4.0 Potentially vulnerable (1.3.4.0-26.el7_2)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Homepage:

389-ds-base

1.3.4.0 Potentially vulnerable (1.3.4.0-29.el7_2)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Homepage:

389-ds-base

1.3.4.0 Potentially vulnerable (1.3.4.0-30.el7_2)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Homepage:

389-ds-base

1.3.4.0 Potentially vulnerable (1.3.4.0-32.el7_2)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Homepage:

389-ds-base

1.3.4.0 Potentially vulnerable (1.3.4.0-33.el7_2)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv3+
  • Homepage:

389-ds-base

1.3.3.1 Potentially vulnerable (1.3.3.1-13.el7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Homepage:

389-ds-base

1.3.3.1 Potentially vulnerable (1.3.3.1-15.el7_1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Homepage:

389-ds-base

1.3.3.1 Potentially vulnerable (1.3.3.1-16.el7_1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Homepage:

389-ds-base

1.3.3.1 Potentially vulnerable (1.3.3.1-20.el7_1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Homepage:

389-ds-base

1.3.3.1 Potentially vulnerable (1.3.3.1-23.el7_1)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Homepage:

389-ds-base

1.3.1.6 Potentially vulnerable (1.3.1.6-10.el7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Homepage:

389-ds-base

1.3.1.6 Potentially vulnerable (1.3.1.6-25.el7)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Homepage:

389-ds-base

1.3.1.6 Potentially vulnerable (1.3.1.6-26.el7_0)
  • Summary:
    389 Directory Server (base)
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2 with exceptions
  • Homepage:
Trisquel 6.0
toutatis/main

389-ds-base

1.2.10.4 Potentially vulnerable (1.2.10.4-0ubuntu3)
Trisquel 6.0
toutatis-updates/main

389-ds-base

1.2.10.4 Potentially vulnerable (1.2.10.4-0ubuntu3.1)
Trisquel 7.0
belenos/main

389-ds-base

1.3.2.16 Potentially vulnerable (1.3.2.16-0ubuntu1)
Trisquel 9.0
etiona/main

389-ds-base

1.3.7.10 Potentially vulnerable (1.3.7.10-1ubuntu1)
Ubuntu 12.04
precise/universe

389-ds-base

1.2.10.4 Potentially vulnerable (1.2.10.4-0ubuntu3)
Ubuntu 12.04
precise-updates/universe

389-ds-base

1.2.10.4 Potentially vulnerable (1.2.10.4-0ubuntu3.1)

389 Directory Server

1.4.3.4