Versions Packages Information History CVEs Badges Report

Packages for fail2ban

175 package(s) known

fail2ban

0.10.1 Potentially vulnerable (0.10.1-r0)

fail2ban

0.10.3.1 Potentially vulnerable (0.10.3.1-r2)

fail2ban-doc

0.10.3.1 Potentially vulnerable (0.10.3.1-r2)

fail2ban-openrc

0.10.3.1 Potentially vulnerable (0.10.3.1-r2)

fail2ban

0.10.4 Potentially vulnerable (0.10.4-r2)

fail2ban-doc

0.10.4 Potentially vulnerable (0.10.4-r2)

fail2ban-openrc

0.10.4 Potentially vulnerable (0.10.4-r2)

fail2ban

0.10.4 Potentially vulnerable (0.10.4-r3)

fail2ban-doc

0.10.4 Potentially vulnerable (0.10.4-r3)

fail2ban-openrc

0.10.4 Potentially vulnerable (0.10.4-r3)

fail2ban

0.11.1 Potentially vulnerable (0.11.1-r3)

fail2ban-doc

0.11.1 Potentially vulnerable (0.11.1-r3)

fail2ban-openrc

0.11.1 Potentially vulnerable (0.11.1-r3)

fail2ban

0.11.1 Potentially vulnerable (0.11.1-r4)

fail2ban-doc

0.11.1 Potentially vulnerable (0.11.1-r4)

fail2ban-openrc

0.11.1 Potentially vulnerable (0.11.1-r4)

fail2ban

0.11.2 Potentially vulnerable (0.11.2-r0)

fail2ban-doc

0.11.2 Potentially vulnerable (0.11.2-r0)

fail2ban-openrc

0.11.2 Potentially vulnerable (0.11.2-r0)

fail2ban-tests

0.11.2 Potentially vulnerable (0.11.2-r0)

fail2ban

0.11.2 Potentially vulnerable (0.11.2-r1)

fail2ban-doc

0.11.2 Potentially vulnerable (0.11.2-r1)

fail2ban-openrc

0.11.2 Potentially vulnerable (0.11.2-r1)

fail2ban-tests

0.11.2 Potentially vulnerable (0.11.2-r1)

fail2ban

0.11.2 Potentially vulnerable (0.11.2-r2)

fail2ban-doc

0.11.2 Potentially vulnerable (0.11.2-r2)

fail2ban-openrc

0.11.2 Potentially vulnerable (0.11.2-r2)

fail2ban-tests

0.11.2 Potentially vulnerable (0.11.2-r2)

fail2ban

0.10.3.1 Potentially vulnerable (0.10.3.1-alt1)

fail2ban

0.11.2 Potentially vulnerable (0.11.2-alt2)

fail2ban

0.11.2 Potentially vulnerable (0.11.2-alt2)

fail2ban

0.8.10 Potentially vulnerable (0.8.10-3.6.amzn1)
  • Summary:
    Ban IPs that make too many password failures
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2+
  • Links(s):
Arch
community

fail2ban

0.11.2 Potentially vulnerable (0.11.2-3)

fail2ban

0.11.2 Potentially vulnerable (0.11.2-2.0)

fail2ban

0.11.2 Potentially vulnerable (0.11.2-2.0)

fail2ban

0.11.2 Potentially vulnerable (0.11.2-2.0)

fail2ban

0.11.2 Potentially vulnerable (0.11.2-3)

fail2ban

0.11.2 Potentially vulnerable (0.11.2-3)

fail2ban-git

0.10.4.r327.g1e59d53b (0.10.4.r327.g1e59d53b-1)
Artix
galaxy

fail2ban

0.11.2 Potentially vulnerable (0.11.2-3)
  • Summary:
    Bans IPs after too many failed authentication attempts
  • License:
    • GPL
  • Links(s):

fail2ban

0.11.2 Potentially vulnerable
CRUX 3.5
contrib

fail2ban

0.11.2 Potentially vulnerable
CRUX 3.6
contrib

fail2ban

0.11.2 Potentially vulnerable
Debian 8
jessie/main

fail2ban

0.8.13 Potentially vulnerable (0.8.13-1)
Debian 9 Backports
stretch-backports/main

fail2ban

0.10.2 Potentially vulnerable (0.10.2-2~bpo9+1)
Deepin
main

fail2ban

0.10.2 Potentially vulnerable (0.10.2-2.1)
Devuan 1.0
jessie/main

fail2ban

0.8.13 Potentially vulnerable (0.8.13-1)
Devuan 2.0
ascii/main

fail2ban

0.9.6 Potentially vulnerable (0.9.6-2)
Devuan 3.0
beowulf/main

fail2ban

0.10.2 Potentially vulnerable (0.10.2-2.1)
Devuan 4.0
chimaera/main

fail2ban

0.11.2 Potentially vulnerable (0.11.2-2)
Devuan Unstable
unstable/main

fail2ban

0.11.2 Potentially vulnerable (0.11.2-6)

security/py-fail2ban

0.11.2 Potentially vulnerable (0.11.2_3)
Entware
armv5sf-k3.2

fail2ban

0.11.2 Potentially vulnerable (0.11.2-2)
Entware
aarch64-k3.10

fail2ban

0.11.2 Potentially vulnerable (0.11.2-2)
Entware
armv7sf-k2.6

fail2ban

0.11.2 Potentially vulnerable (0.11.2-2)
Entware
armv7sf-k3.2

fail2ban

0.11.2 Potentially vulnerable (0.11.2-2)
Entware
mipselsf-k3.4

fail2ban

0.11.2 Potentially vulnerable (0.11.2-2)
Entware
mipssf-k3.4

fail2ban

0.11.2 Potentially vulnerable (0.11.2-2)
Entware
x64-k3.2

fail2ban

0.11.2 Potentially vulnerable (0.11.2-2)

fail2ban

0.9.6 Potentially vulnerable (0.9.6-1.el6.1)
  • Summary:
    Ban IPs that make too many password failures
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2+
  • Links(s):

fail2ban

0.11.2 Potentially vulnerable (0.11.2-3.el7)

fail2ban

0.11.2 Potentially vulnerable (0.11.2-1.el8)

fail2ban

0.11.2 Potentially vulnerable (0.11.2-11.el9)

net-analyzer/fail2ban

scm

net-analyzer/fail2ban

0.11.2 Potentially vulnerable
Fedora 26
updates

fail2ban

0.9.7 Potentially vulnerable (0.9.7-2.fc26)
Fedora 26
release

fail2ban

0.9.6 Potentially vulnerable (0.9.6-4.fc26)
Fedora 27
updates

fail2ban

0.10.3.1 Potentially vulnerable (0.10.3.1-2.fc27)
Fedora 27
release

fail2ban

0.10.0 Potentially vulnerable (0.10.0-1.fc27)
Fedora 28
updates

fail2ban

0.10.3.1 Potentially vulnerable (0.10.3.1-2.fc28)
Fedora 28
release

fail2ban

0.10.1 Potentially vulnerable (0.10.1-4.fc28)
Fedora 29
updates

fail2ban

0.10.4 Potentially vulnerable (0.10.4-1.fc29)
Fedora 29
release

fail2ban

0.10.3.1 Potentially vulnerable (0.10.3.1-3.fc29)
Fedora 30
updates

fail2ban

0.11.1 Potentially vulnerable (0.11.1-6.fc30)
Fedora 30
release

fail2ban

0.10.4 Potentially vulnerable (0.10.4-3.fc30)
Fedora 31
updates

fail2ban

0.11.1 Potentially vulnerable (0.11.1-10.fc31)
Fedora 31
release

fail2ban

0.10.4 Potentially vulnerable (0.10.4-4.fc31)
Fedora 32
updates

fail2ban

0.11.2 Potentially vulnerable (0.11.2-1.fc32)
Fedora 32
release

fail2ban

0.11.1 Potentially vulnerable (0.11.1-4.fc32)
Fedora 33
updates

fail2ban

0.11.2 Potentially vulnerable (0.11.2-1.fc33)
Fedora 33
release

fail2ban

0.11.1 Potentially vulnerable (0.11.1-10.fc33)
Fedora 34
release

fail2ban

0.11.2 Potentially vulnerable (0.11.2-3.fc34)
Fedora 34
updates

fail2ban

0.11.2 Potentially vulnerable (0.11.2-9.fc34)
Fedora 35
release

fail2ban

0.11.2 Potentially vulnerable (0.11.2-8.fc35)
Fedora 35
updates

fail2ban

0.11.2 Potentially vulnerable (0.11.2-9.fc35)
Fedora 36
development

fail2ban

0.11.2 Potentially vulnerable (0.11.2-11.fc36)
Fedora Rawhide
development

fail2ban

0.11.2 Potentially vulnerable (0.11.2-12.fc37)

security/py-fail2ban

0.11.2 Potentially vulnerable (0.11.2_3)
Funtoo 1.4
net-kit

net-analyzer/fail2ban

0.11.2 Potentially vulnerable

net-analyzer/fail2ban

9999

net-analyzer/fail2ban

0.11.2 Potentially vulnerable (0.11.2-r4)

fail2ban

0.11.2 Potentially vulnerable

fail2ban

0.11.2 Potentially vulnerable (0.11.2-6)
KaOS
main

fail2ban

0.11.2 Potentially vulnerable (0.11.2-3)

net-analyzer/fail2ban

9999

net-analyzer/fail2ban

0.11.2 Potentially vulnerable (0.11.2-r4)

net-analyzer/fail2ban

9999

net-analyzer/fail2ban

0.11.2 Potentially vulnerable (0.11.2-r4)

fail2ban

0.9.4 Potentially vulnerable
Mageia 7
core/release

fail2ban

0.10.4 Potentially vulnerable (0.10.4-2.mga7)
Mageia 8
core/release

fail2ban

0.11.2 Potentially vulnerable (0.11.2-1.mga8)
  • Summary:
    Ban IP-addresses that result in too many password failures
  • Category:
    • System/Networking
  • License:
    • GPLv2+
  • Links(s):
Mageia 8
core/updates

fail2ban

0.11.2 Potentially vulnerable (0.11.2-1.1.mga8)
  • Summary:
    Ban IP-addresses that result in too many password failures
  • Category:
    • System/Networking
  • License:
    • GPLv2+
  • Links(s):
Mageia Cauldron
core/release

fail2ban

0.11.2 Potentially vulnerable (0.11.2-5.mga9)
Manjaro Stable
community

fail2ban

0.11.2 Potentially vulnerable (0.11.2-3)
  • Summary:
    Bans IPs after too many failed authentication attempts
  • License:
    • GPL
  • Links(s):
Manjaro Testing
community

fail2ban

0.11.2 Potentially vulnerable (0.11.2-3)
  • Summary:
    Bans IPs after too many failed authentication attempts
  • License:
    • GPL
  • Links(s):

fail2ban

0.11.2 Potentially vulnerable (0.11.2-3)
  • Summary:
    Bans IPs after too many failed authentication attempts
  • License:
    • GPL
  • Links(s):

security/py-fail2ban

0.11.2 Potentially vulnerable

fail2ban

0.9.7 Potentially vulnerable (0.9.7-1~nd80+1)

fail2ban

0.9.7 Potentially vulnerable (0.9.7-1~nd90+1)

fail2ban

0.9.7 Potentially vulnerable (0.9.7-1~nd+1)

fail2ban

0.9.7 Potentially vulnerable (0.9.7-1~nd14.04+1)

fail2ban

0.9.7 Potentially vulnerable (0.9.7-1~nd16.04+1)

fail2ban

0.11.1 Potentially vulnerable

fail2ban

0.11.2 Potentially vulnerable

fail2ban

0.11.2 Potentially vulnerable
openmamba
devel

fail2ban

0.11.2 Potentially vulnerable (0.11.2-3mamba)
OpenMandriva 4.0
unsupported/release

fail2ban

0.10.4 Potentially vulnerable (0.10.4-1)
OpenMandriva 4.1
unsupported/release

fail2ban

0.10.4 Potentially vulnerable (0.10.4-1)
OpenMandriva 4.2
unsupported/release

fail2ban

0.10.4 Potentially vulnerable (0.10.4-1)
OpenMandriva Rolling
unsupported/release

fail2ban

0.10.4 Potentially vulnerable (0.10.4-1)
OpenMandriva Cooker
unsupported/release

fail2ban

0.10.4 Potentially vulnerable (0.10.4-1)

fail2ban

0.9.7 Potentially vulnerable (0.9.7-3.1)

fail2ban

0.10.3.1 Potentially vulnerable (0.10.3.1-lp150.1.1)

fail2ban

0.10.4 Potentially vulnerable (0.10.4-lp151.1.1)
openSUSE Leap 15.2
updates/oss

fail2ban

0.11.2 Potentially vulnerable (0.11.2-lp152.3.3.1)

fail2ban

0.10.4 Potentially vulnerable (0.10.4-lp152.2.3)

fail2ban

0.11.2 Potentially vulnerable (0.11.2-bp153.2.3.1)

fail2ban

0.11.2 Potentially vulnerable (0.11.2-150400.2.4)

fail2ban

0.11.2 Potentially vulnerable (0.11.2-5.3)

fail2ban

0.11.2 Potentially vulnerable (0.11.2-128.6)

fail2ban

0.11.2 Potentially vulnerable (0.11.2-5)

fail2ban-src

0.11.2 Potentially vulnerable (0.11.2-5)
Parabola
community

fail2ban

0.11.2 Potentially vulnerable (0.11.2-3)

fail2ban

0.9.6 Potentially vulnerable (0.9.6-2)

fail2ban

0.10.2 Potentially vulnerable (0.10.2-2.1)

fail2ban

0.11.2 Potentially vulnerable (0.11.2-2)
Parrot
parrot/main

fail2ban

0.11.2 Potentially vulnerable (0.11.2-2)
Parrot
parrot-updates/main

fail2ban

0.11.2 Potentially vulnerable (0.11.2-2)

fail2ban

0.10.3.1 Potentially vulnerable (0.10.3.1-1pclos2018)
  • Summary:
    Ban hosts that cause multiple authentication errors
  • Category:
    • System/Configuration/Networking

security/fail2ban

0.11.2 Potentially vulnerable (0.11.2nb1)

fail2ban

0.10.2 Potentially vulnerable (0.10.2-2.1)

fail2ban

0.11.2 Potentially vulnerable (0.11.2-2)

fail2ban

0.10.2 Potentially vulnerable (0.10.2-2.1)

fail2ban

0.11.2 Potentially vulnerable (0.11.2-2)

fail2ban

0.11.2 Potentially vulnerable (0.11.2-6)
Rosa 2014.1
contrib/updates

fail2ban

0.8.14 Potentially vulnerable (0.8.14-1)
Rosa 2014.1
contrib/release

fail2ban

0.8.6 Potentially vulnerable (0.8.6-3)
Rosa 2016.1
contrib/updates

fail2ban

0.11.2 Potentially vulnerable (0.11.2-1)
Rosa 2016.1
contrib/release

fail2ban

0.8.14 Potentially vulnerable (0.8.14-3)
Rosa 2019.1
contrib/release

fail2ban

0.11.2 Potentially vulnerable (0.11.2-1)
Rosa Server 6.9
extra/release

fail2ban

0.9.6 Potentially vulnerable (0.9.6-1.res6.1)

network/fail2ban

0.11.2 Potentially vulnerable

fail2ban

0.11.2 Potentially vulnerable

fail2ban

0.9.0 Potentially vulnerable
Trisquel 6.0
toutatis-updates/main

fail2ban

0.8.6 Potentially vulnerable (0.8.6-3wheezy3build0.12.04.1)
Trisquel 6.0
toutatis/main

fail2ban

0.8.6 Potentially vulnerable (0.8.6-3)
Trisquel 7.0
belenos/main

fail2ban

0.8.11 Potentially vulnerable (0.8.11-1)
Trisquel 8.0
flidas/main

fail2ban

0.9.3 Potentially vulnerable (0.9.3-1)
Trisquel 9.0
etiona/main

fail2ban

0.10.2 Potentially vulnerable (0.10.2-2)
Trisquel 10.0
nabia/main

fail2ban

0.11.1 Potentially vulnerable (0.11.1-1)
Ubuntu 14.04
trusty/universe

fail2ban

0.8.11 Potentially vulnerable (0.8.11-1)
Ubuntu 16.04
xenial/universe

fail2ban

0.9.3 Potentially vulnerable (0.9.3-1)
Ubuntu 18.04
bionic/universe

fail2ban

0.10.2 Potentially vulnerable (0.10.2-2)

fail2ban

0.11.2 Potentially vulnerable (0.11.2_3)

Fail2ban

0.11.2 Potentially vulnerable