IPv6 logo

You are connected to Repology using legacy IPv4 protocol. Due to IPv4 address exhaustion it may become too expensive or impossible for Repology to support IPv4 in the nearest future. Time to switch to IPv6!

Versions Packages Information History CVEs Badges Report

Packages for c3p0

61 package(s) known

c3p0

0.9.5-pre8 Potentially vulnerable (0.9.5-alt1_0.7.pre8jpp8)
Apertis v2020
v2020/development

c3p0

0.9.1.2 Potentially vulnerable (0.9.1.2-10)
Apertis v2021
v2021/development

c3p0

0.9.1.2 Potentially vulnerable (0.9.1.2-10co1)
Apertis v2022
v2022/development

c3p0

0.9.1.2 Potentially vulnerable (0.9.1.2-10co1)
Deepin
main

c3p0

0.9.1.2 Potentially vulnerable (0.9.1.2-10)
Devuan 3.0
beowulf/main

c3p0

0.9.1.2 Potentially vulnerable (0.9.1.2-10)
Devuan 4.0
chimaera/main

c3p0

0.9.1.2 Potentially vulnerable (0.9.1.2-10)
Devuan Unstable
unstable/main

c3p0

0.9.1.2 Potentially vulnerable (0.9.1.2-10)

databases/c3p0

0.9.5.3

c3p0

0.9.2.1 Potentially vulnerable (0.9.2.1-6.el7)
Fedora 26
release

c3p0

0.9.5-pre8 Potentially vulnerable (0.9.5-0.4.pre8.fc26)
Fedora 27
release

c3p0

0.9.5-pre8 Potentially vulnerable (0.9.5-0.5.pre8.fc27)
Fedora 28
release

c3p0

0.9.5-pre8 Potentially vulnerable (0.9.5-0.6.pre8.fc28)
Fedora 29
updates

c3p0

0.9.5.4 (0.9.5.4-1.fc29)
Fedora 29
release

c3p0

0.9.5-pre8 Potentially vulnerable (0.9.5-0.7.pre8.fc29)
Fedora 30
updates

c3p0

0.9.5.4 (0.9.5.4-1.fc30)
Fedora 30
release

c3p0

0.9.5-pre8 Potentially vulnerable (0.9.5-0.8.pre8.fc30)
Fedora 31
release

c3p0

0.9.5.4 (0.9.5.4-2.fc31)

databases/c3p0

0.9.5.3

dev-java/c3p0

0.9.5.5 (0.9.5.5-r1)

dev-java/c3p0

0.9.5.5 (0.9.5.5-r1)

dev-java/c3p0

0.9.5.5 (0.9.5.5-r1)
Mageia 7
core/updates

c3p0

0.9.5.4 (0.9.5.4-1.mga7)
Mageia 7
core/release

c3p0

0.9.5-pre8 Potentially vulnerable (0.9.5-0.5.pre8.1.mga7)

databases/c3p0

0.9.5.5

c3p0

0.9.5.4 (0.9.5.4-2.oe2203)

c3p0

0.9.5.5 (0.9.5.5-150400.1.12)

c3p0

0.9.5.5 (0.9.5.5-150400.1.12)

c3p0

0.9.5.5 (0.9.5.5-4.6)

c3p0

0.9.1.2 Potentially vulnerable (0.9.1.2-10)
Parrot
parrot/main

c3p0

0.9.1.2 Potentially vulnerable (0.9.1.2-10)
Parrot
parrot-updates/main

c3p0

0.9.1.2 Potentially vulnerable (0.9.1.2-10)
Rosa 2021.1
main/release

c3p0

0.9.5.4 (0.9.5.4-2)
Trisquel 10.0
nabia-updates/main

c3p0

0.9.1.2 Potentially vulnerable (0.9.1.2-10ubuntu0.20.04.1)
Trisquel 10.0
nabia-security/main

c3p0

0.9.1.2 Potentially vulnerable (0.9.1.2-10ubuntu0.20.04.1)
Trisquel 10.0
nabia/main

c3p0

0.9.1.2 Potentially vulnerable (0.9.1.2-10)
Trisquel 11.0
aramo/main

c3p0

0.9.1.2 Potentially vulnerable (0.9.1.2-10ubuntu1)
Ubuntu 14.04
trusty-updates/universe

c3p0

0.9.1.2 Potentially vulnerable (0.9.1.2-9+deb8u1build0.14.04.1)
Ubuntu 16.04
xenial-updates/universe

c3p0

0.9.1.2 Potentially vulnerable (0.9.1.2-9+deb8u1build0.16.04.1)
Ubuntu 18.04
bionic-updates/universe

c3p0

0.9.1.2 Potentially vulnerable (0.9.1.2-9+deb8u1ubuntu0.18.04.1)