Versions Packages Information History CVEs Related Badges Report

Versions for maradns

62 package(s) known

Repository Package name Version Category Maintainer(s)
AUR maradns 3.5.0021 Potentially vulnerable - h8red@aur
Debian 9
stretch/main
maradns 2.0.13 Potentially vulnerable net dariusz.dwornikowski@cs.put.poznan.pl
Debian 10
buster/main
maradns 2.0.13 Potentially vulnerable net dariusz.dwornikowski@cs.put.poznan.pl
Debian 11
bullseye/main
maradns 2.0.13 Potentially vulnerable net dariusz.dwornikowski@cs.put.poznan.pl
Debian Unstable
sid/main
maradns 2.0.13 Potentially vulnerable net dariusz.dwornikowski@cs.put.poznan.pl
Deepin
main
maradns 2.0.13 Potentially vulnerable - dariusz.dwornikowski@cs.put.poznan.pl
Devuan 2.0
ascii/main
maradns 2.0.13 Potentially vulnerable net dariusz.dwornikowski@cs.put.poznan.pl
Devuan 3.0
beowulf/main
maradns 2.0.13 Potentially vulnerable net dariusz.dwornikowski@cs.put.poznan.pl
Devuan 4.0
chimaera/main
maradns 2.0.13 Potentially vulnerable net dariusz.dwornikowski@cs.put.poznan.pl
Devuan Unstable
unstable/main
maradns 2.0.13 Potentially vulnerable net dariusz.dwornikowski@cs.put.poznan.pl
Fedora 26
release
maradns 2.0.14 Potentially vulnerable Unspecified -
Fedora 27
release
maradns 2.0.14 Potentially vulnerable Unspecified -
Fedora 28
release
maradns 2.0.15 Potentially vulnerable Unspecified -
Fedora 29
release
maradns 2.0.15 Potentially vulnerable Unspecified -
Fedora 30
release
maradns 2.0.17 Potentially vulnerable Unspecified -
Fedora 31
release
maradns 2.0.17 Potentially vulnerable Unspecified -
Fedora 32
release
maradns 3.4.02 Potentially vulnerable Unspecified -
Fedora 33
release
maradns 3.5.0005 Potentially vulnerable Unspecified -
Fedora 34
release
maradns 3.5.0012 Potentially vulnerable Unspecified -
Fedora 35
release
maradns 3.5.0020 Potentially vulnerable Unspecified -
Fedora 36
release
maradns 3.5.0020 Potentially vulnerable Unspecified -
Fedora 37
updates
maradns 3.5.0030 Unspecified -
Fedora 37
release
maradns 3.5.0020 Potentially vulnerable Unspecified -
Fedora Rawhide
development
maradns 3.5.0030 Unspecified -
FreeBSD Ports dns/maradns 2.0.15 Potentially vulnerable dns je3kmz@freebsd.org
Funtoo 1.4
net-kit
net-dns/maradns 2.0.16 Potentially vulnerable net-dns ktrace@yandex.ru, proxy-maint@gentoo.org
Funtoo 1.4
net-kit
net-dns/maradns 2.0.14 Potentially vulnerable net-dns ktrace@yandex.ru, proxy-maint@gentoo.org
Funtoo 1.4
net-kit
net-dns/maradns 2.0.09 Potentially vulnerable net-dns ktrace@yandex.ru, proxy-maint@gentoo.org
Gentoo net-dns/maradns 3.5.0022 net-dns maintainer-needed@gentoo.org
GNU Guix maradns 3.5.0022 - -
LiGurOS stable net-dns/maradns 3.5.0022 net-dns fallback-mnt-liguros@repology
LiGurOS develop net-dns/maradns 3.5.0022 net-dns fallback-mnt-liguros@repology
MacPorts maradns 1.2.12.09 Potentially vulnerable net nomaintainer@macports.org
OpenBSD Ports net/maradns 1.3.07.15 Potentially vulnerable net ports@openbsd.org
OpenPKG maradns 2.0.17 Potentially vulnerable DNS -
Pardus 17
main
maradns 2.0.13 Potentially vulnerable net dariusz.dwornikowski@cs.put.poznan.pl
Pardus 19
main
maradns 2.0.13 Potentially vulnerable net dariusz.dwornikowski@cs.put.poznan.pl
Pardus 21
main
maradns 2.0.13 Potentially vulnerable net dariusz.dwornikowski@cs.put.poznan.pl
Parrot
parrot-updates/main
maradns 2.0.13 Potentially vulnerable net dariusz.dwornikowski@cs.put.poznan.pl
Parrot
parrot/main
maradns 2.0.13 Potentially vulnerable net dariusz.dwornikowski@cs.put.poznan.pl
pkgsrc current net/maradns 2.0.17 Potentially vulnerable net ddeus.pkgsrc@mailnull.com
PureOS Amber maradns 2.0.13 Potentially vulnerable misc dariusz.dwornikowski@cs.put.poznan.pl
PureOS landing maradns 2.0.13 Potentially vulnerable misc dariusz.dwornikowski@cs.put.poznan.pl
Raspbian Oldstable
main
maradns 2.0.13 Potentially vulnerable net dariusz.dwornikowski@cs.put.poznan.pl
Raspbian Stable
main
maradns 2.0.13 Potentially vulnerable net dariusz.dwornikowski@cs.put.poznan.pl
Raspbian Testing
main
maradns 2.0.13 Potentially vulnerable net dariusz.dwornikowski@cs.put.poznan.pl
Rosa 2014.1
contrib/release
maradns 1.4.06 Potentially vulnerable - -
Rosa 2016.1
contrib/release
maradns 1.4.06 Potentially vulnerable - -
Rosa 2021.1
contrib/release
maradns 3.5.0022 System/Servers a.proklov@rosalinux.ru
Trisquel 6.0
toutatis/main
maradns 2.0.04+really1.4.09 Potentially vulnerable universe/net nicholas@periapt.co.uk
Trisquel 7.0
belenos/main
maradns 2.0.09 Potentially vulnerable universe/net dariusz.dwornikowski@cs.put.poznan.pl
Trisquel 8.0
flidas/main
maradns 2.0.13 Potentially vulnerable universe/net dariusz.dwornikowski@cs.put.poznan.pl
Trisquel 9.0
etiona/main
maradns 2.0.13 Potentially vulnerable universe/net dariusz.dwornikowski@cs.put.poznan.pl
Trisquel 10.0
nabia/main
maradns 2.0.13 Potentially vulnerable universe/net dariusz.dwornikowski@cs.put.poznan.pl
Ubuntu 14.04
trusty/universe
maradns 2.0.09 Potentially vulnerable universe/net dariusz.dwornikowski@cs.put.poznan.pl
Ubuntu 16.04
xenial/universe
maradns 2.0.13 Potentially vulnerable universe/net dariusz.dwornikowski@cs.put.poznan.pl
Ubuntu 18.04
bionic/universe
maradns 2.0.13 Potentially vulnerable universe/net dariusz.dwornikowski@cs.put.poznan.pl
Ubuntu 20.04
focal/universe
maradns 2.0.13 Potentially vulnerable universe/net dariusz.dwornikowski@cs.put.poznan.pl
Ubuntu 22.04
jammy/universe
maradns 2.0.13 Potentially vulnerable universe/net dariusz.dwornikowski@cs.put.poznan.pl
Ubuntu 22.10
kinetic/universe
maradns 2.0.13 Potentially vulnerable universe/net dariusz.dwornikowski@cs.put.poznan.pl
Ubuntu 23.04
lunar/universe
maradns 2.0.13 Potentially vulnerable universe/net dariusz.dwornikowski@cs.put.poznan.pl
Wikidata MaraDNS 3.4.01 Potentially vulnerable - -