Versions Packages Information History CVEs Related Badges Report

Versions for redmine

192 package(s) known

Repository Package name Version Category Maintainer(s)
Arch
community
redmine 5.0.4 - -
Arch Linux 32 i486
community
redmine 5.0.3 Potentially vulnerable - -
Arch Linux 32 i686
community
redmine 5.0.4 - -
Arch Linux 32 pentium4
community
redmine 5.0.4 - -
Arch Linux ARM aarch64
community
redmine 5.0.4 - -
Arch Linux ARM armv7h
community
redmine 5.0.4 - -
Astra Orel Stable
main
redmine 4.0.1 Potentially vulnerable web pkg-ruby-extras-maintainers@lists.alioth.debian.org, duck@duckcorp.org, kanashiro@debian.org, kapouer@melix.org
Debian 9
stretch/main
redmine 3.3.1 Potentially vulnerable web terceiro@debian.org, kapouer@melix.org, pkg-ruby-extras-maintainers@lists.alioth.debian.org
Debian 9
stretch/updates/main
redmine 3.3.1 Potentially vulnerable web terceiro@debian.org, kapouer@melix.org, pkg-ruby-extras-maintainers@lists.alioth.debian.org
Debian 10 Backports
buster-backports/main
redmine 4.0.7 Potentially vulnerable misc pkg-ruby-extras-maintainers@lists.alioth.debian.org, duck@duckcorp.org, kanashiro@debian.org, kapouer@melix.org
Debian 12
bookworm/main
redmine 5.0.2 Potentially vulnerable web pkg-ruby-extras-maintainers@lists.alioth.debian.org, duck@duckcorp.org, kanashiro@debian.org, kapouer@melix.org, utkarsh@debian.org
Debian Unstable
sid/main
redmine 5.0.4 web pkg-ruby-extras-maintainers@lists.alioth.debian.org, duck@duckcorp.org, kanashiro@debian.org, kapouer@melix.org, utkarsh@debian.org
Devuan 2.0
ascii/main
redmine 3.3.1 Potentially vulnerable web terceiro@debian.org, kapouer@melix.org, pkg-ruby-extras-maintainers@lists.alioth.debian.org
Devuan Unstable
unstable/main
redmine 5.0.4 web pkg-ruby-extras-maintainers@lists.alioth.debian.org, duck@duckcorp.org, kanashiro@debian.org, kapouer@melix.org, utkarsh@debian.org
Funtoo 1.4
net-kit
www-apps/redmine 3.4.5 Potentially vulnerable www-apps azamat.hackimov@gmail.com, proxy-maint@gentoo.org
Funtoo 1.4
net-kit
www-apps/redmine 3.3.7 Potentially vulnerable www-apps azamat.hackimov@gmail.com, proxy-maint@gentoo.org
Gentoo www-apps/redmine 5.0.4 www-apps azamat.hackimov@gmail.com, proxy-maint@gentoo.org
Gentoo www-apps/redmine 4.2.9 www-apps azamat.hackimov@gmail.com, proxy-maint@gentoo.org
Kali Linux Rolling
main
redmine 5.0.2 Potentially vulnerable web pkg-ruby-extras-maintainers@lists.alioth.debian.org, duck@duckcorp.org, kanashiro@debian.org, kapouer@melix.org, utkarsh@debian.org
LiGurOS stable www-apps/redmine 5.0.4 www-apps azamat.hackimov@gmail.com, proxy-maint@gentoo.org
LiGurOS stable www-apps/redmine 4.2.9 www-apps azamat.hackimov@gmail.com, proxy-maint@gentoo.org
LiGurOS develop www-apps/redmine 5.0.4 www-apps azamat.hackimov@gmail.com, proxy-maint@gentoo.org
LiGurOS develop www-apps/redmine 4.2.9 www-apps azamat.hackimov@gmail.com, proxy-maint@gentoo.org
Manjaro Stable
community
redmine 5.0.4 - -
Manjaro Testing
community
redmine 5.0.4 - -
Manjaro Unstable
community
redmine 5.0.4 - -
nixpkgs stable 21.11 redmine 4.2.4 Potentially vulnerable - aaron@fosslib.net
nixpkgs stable 22.05 redmine 4.2.9 - aaron@fosslib.net, felixsinger@posteo.net
nixpkgs stable 22.11 redmine 4.2.9 - aaron@fosslib.net, felixsinger@posteo.net
nixpkgs unstable redmine 4.2.9 - aaron@fosslib.net, felixsinger@posteo.net
OpenMandriva 4.0
unsupported/release
redmine 2.3.2 Potentially vulnerable Networking/WWW bero@lindev.ch
OpenMandriva 4.1
unsupported/release
redmine 2.3.2 Potentially vulnerable Networking/WWW bero@lindev.ch
OpenMandriva 4.2
unsupported/release
redmine 2.3.2 Potentially vulnerable Networking/WWW bero@lindev.ch
OpenMandriva 4.3
unsupported/release
redmine 2.3.2 Potentially vulnerable Networking/WWW bero@lindev.ch
OpenMandriva Rolling
unsupported/release
redmine 2.3.2 Potentially vulnerable Networking/WWW bero@lindev.ch
OpenMandriva Cooker
unsupported/release
redmine 2.3.2 Potentially vulnerable Networking/WWW bero@lindev.ch
Parabola
community
redmine 5.0.4 - -
Pardus 17
updates/main
redmine 3.3.1 Potentially vulnerable web terceiro@debian.org, kapouer@melix.org, pkg-ruby-extras-maintainers@lists.alioth.debian.org
Pardus 17
main
redmine 3.3.1 Potentially vulnerable web terceiro@debian.org, kapouer@melix.org, pkg-ruby-extras-maintainers@lists.alioth.debian.org
Raspbian Stable
main
redmine 4.0.7 Potentially vulnerable web pkg-ruby-extras-maintainers@lists.alioth.debian.org, duck@duckcorp.org, kanashiro@debian.org, kapouer@melix.org
Raspbian Testing
main
redmine 5.0.2 Potentially vulnerable web pkg-ruby-extras-maintainers@lists.alioth.debian.org, duck@duckcorp.org, kanashiro@debian.org, kapouer@melix.org, utkarsh@debian.org
Rosa 2021.1
contrib/release
redmine 5.0.3 Potentially vulnerable Networking/WWW alexander@mezon.ru
RPM Sphere redmine 5.0.3 Potentially vulnerable Networking/WWW -
Trisquel 6.0
toutatis/main
redmine 1.3.2 Potentially vulnerable universe/web ubuntu-devel-discuss@lists.ubuntu.com, pkg-ruby-extras-maintainers@lists.alioth.debian.org
Trisquel 7.0
belenos/main
redmine 2.4.2 Potentially vulnerable universe/web kapouer@melix.org, ondrej@debian.org, pkg-ruby-extras-maintainers@lists.alioth.debian.org, terceiro@debian.org
Trisquel 8.0
flidas/main
redmine 3.2.1 Potentially vulnerable universe/web terceiro@debian.org, kapouer@melix.org, pkg-ruby-extras-maintainers@lists.alioth.debian.org
Trisquel 8.0
flidas-updates/main
redmine 3.2.1 Potentially vulnerable universe/web ubuntu-devel-discuss@lists.ubuntu.com, kapouer@melix.org, pkg-ruby-extras-maintainers@lists.alioth.debian.org
Trisquel 9.0
etiona/main
redmine 3.4.4 Potentially vulnerable universe/web pkg-ruby-extras-maintainers@lists.alioth.debian.org, duck@duckcorp.org, kanashiro@debian.org, kapouer@melix.org
Trisquel 9.0
etiona-updates/main
redmine 3.4.4 Potentially vulnerable universe/web ubuntu-devel-discuss@lists.ubuntu.com, duck@duckcorp.org, kanashiro@debian.org, kapouer@melix.org
Trisquel 10.0
nabia/main
redmine 4.0.6 Potentially vulnerable universe/web pkg-ruby-extras-maintainers@lists.alioth.debian.org, duck@duckcorp.org, kanashiro@debian.org, kapouer@melix.org
Ubuntu 14.04
trusty/universe
redmine 2.4.2 Potentially vulnerable universe/web kapouer@melix.org, ondrej@debian.org, pkg-ruby-extras-maintainers@lists.alioth.debian.org, terceiro@debian.org
Ubuntu 16.04
xenial/universe
redmine 3.2.1 Potentially vulnerable universe/web terceiro@debian.org, kapouer@melix.org, pkg-ruby-extras-maintainers@lists.alioth.debian.org
Ubuntu 16.04
xenial-updates/universe
redmine 3.2.1 Potentially vulnerable universe/web ubuntu-devel-discuss@lists.ubuntu.com, kapouer@melix.org, pkg-ruby-extras-maintainers@lists.alioth.debian.org
Ubuntu 18.04
bionic/universe
redmine 3.4.4 Potentially vulnerable universe/web pkg-ruby-extras-maintainers@lists.alioth.debian.org, duck@duckcorp.org, kanashiro@debian.org, kapouer@melix.org
Ubuntu 18.04
bionic-updates/universe
redmine 3.4.4 Potentially vulnerable universe/web ubuntu-devel-discuss@lists.ubuntu.com, duck@duckcorp.org, kanashiro@debian.org, kapouer@melix.org
Ubuntu 20.04
focal/universe
redmine 4.0.6 Potentially vulnerable universe/web pkg-ruby-extras-maintainers@lists.alioth.debian.org, duck@duckcorp.org, kanashiro@debian.org, kapouer@melix.org
Ubuntu 22.10
kinetic/universe
redmine 5.0.2 Potentially vulnerable universe/web pkg-ruby-extras-maintainers@lists.alioth.debian.org, duck@duckcorp.org, kanashiro@debian.org, kapouer@melix.org, utkarsh@debian.org
Ubuntu 23.04
lunar/universe
redmine 5.0.2 Potentially vulnerable universe/web pkg-ruby-extras-maintainers@lists.alioth.debian.org, duck@duckcorp.org, kanashiro@debian.org, kapouer@melix.org, utkarsh@debian.org
Ubuntu 23.04 Proposed
lunar-proposed/universe
redmine 5.0.4 universe/web pkg-ruby-extras-maintainers@lists.alioth.debian.org, duck@duckcorp.org, kanashiro@debian.org, kapouer@melix.org, utkarsh@debian.org
Wikidata Redmine 5.0.4 - -
Wikidata Redmine 5.0.3 Potentially vulnerable - -
Wikidata Redmine 5.0.2 Potentially vulnerable - -
Wikidata Redmine 5.0.1 Potentially vulnerable - -
Wikidata Redmine 5.0.0 Potentially vulnerable - -
Wikidata Redmine 4.2.9 - -
Wikidata Redmine 4.2.8 Potentially vulnerable - -
Wikidata Redmine 4.2.7 Potentially vulnerable - -
Wikidata Redmine 4.2.6 Potentially vulnerable - -
Wikidata Redmine 4.2.5 Potentially vulnerable - -
Wikidata Redmine 4.2.4 Potentially vulnerable - -
Wikidata Redmine 4.2.3 Potentially vulnerable - -
Wikidata Redmine 4.2.2 Potentially vulnerable - -
Wikidata Redmine 4.2.1 Potentially vulnerable - -
Wikidata Redmine 4.2.0 Potentially vulnerable - -
Wikidata Redmine 4.1.7 Potentially vulnerable - -
Wikidata Redmine 4.1.6 Potentially vulnerable - -
Wikidata Redmine 4.1.5 Potentially vulnerable - -
Wikidata Redmine 4.1.4 Potentially vulnerable - -
Wikidata Redmine 4.1.3 Potentially vulnerable - -
Wikidata Redmine 4.1.2 Potentially vulnerable - -
Wikidata Redmine 4.1.1 Potentially vulnerable - -
Wikidata Redmine 4.1.0 Potentially vulnerable - -
Wikidata Redmine 4.0.9 Potentially vulnerable - -
Wikidata Redmine 4.0.8 Potentially vulnerable - -
Wikidata Redmine 4.0.7 Potentially vulnerable - -
Wikidata Redmine 4.0.6 Potentially vulnerable - -
Wikidata Redmine 4.0.5 Potentially vulnerable - -
Wikidata Redmine 4.0.4 Potentially vulnerable - -
Wikidata Redmine 4.0.3 Potentially vulnerable - -
Wikidata Redmine 4.0.2 Potentially vulnerable - -
Wikidata Redmine 4.0.1 Potentially vulnerable - -
Wikidata Redmine 4.0.0 Potentially vulnerable - -
Wikidata Redmine 3.4.13 Potentially vulnerable - -
Wikidata Redmine 3.4.12 Potentially vulnerable - -
Wikidata Redmine 3.4.11 Potentially vulnerable - -
Wikidata Redmine 3.4.10 Potentially vulnerable - -
Wikidata Redmine 3.4.9 Potentially vulnerable - -
Wikidata Redmine 3.4.8 Potentially vulnerable - -
Wikidata Redmine 3.4.7 Potentially vulnerable - -
Wikidata Redmine 3.4.6 Potentially vulnerable - -
Wikidata Redmine 3.4.5 Potentially vulnerable - -
Wikidata Redmine 3.4.4 Potentially vulnerable - -
Wikidata Redmine 3.4.3 Potentially vulnerable - -
Wikidata Redmine 3.4.2 Potentially vulnerable - -
Wikidata Redmine 3.4.1 Potentially vulnerable - -
Wikidata Redmine 3.4.0 Potentially vulnerable - -
Wikidata Redmine 3.3.10 Potentially vulnerable - -
Wikidata Redmine 3.3.9 Potentially vulnerable - -
Wikidata Redmine 3.3.8 Potentially vulnerable - -
Wikidata Redmine 3.3.7 Potentially vulnerable - -
Wikidata Redmine 3.3.6 Potentially vulnerable - -
Wikidata Redmine 3.3.5 Potentially vulnerable - -
Wikidata Redmine 3.3.4 Potentially vulnerable - -
Wikidata Redmine 3.3.3 Potentially vulnerable - -
Wikidata Redmine 3.3.2 Potentially vulnerable - -
Wikidata Redmine 3.3.1 Potentially vulnerable - -
Wikidata Redmine 3.3.0 Potentially vulnerable - -
Wikidata Redmine 3.2.9 Potentially vulnerable - -
Wikidata Redmine 3.2.8 Potentially vulnerable - -
Wikidata Redmine 3.2.7 Potentially vulnerable - -
Wikidata Redmine 3.2.6 Potentially vulnerable - -
Wikidata Redmine 3.2.5 Potentially vulnerable - -
Wikidata Redmine 3.2.4 Potentially vulnerable - -
Wikidata Redmine 3.2.3 Potentially vulnerable - -
Wikidata Redmine 3.2.2 Potentially vulnerable - -
Wikidata Redmine 3.2.1 Potentially vulnerable - -
Wikidata Redmine 3.2.0 Potentially vulnerable - -
Wikidata Redmine 3.1.7 Potentially vulnerable - -
Wikidata Redmine 3.1.6 Potentially vulnerable - -
Wikidata Redmine 3.1.5 Potentially vulnerable - -
Wikidata Redmine 3.1.4 Potentially vulnerable - -
Wikidata Redmine 3.1.3 Potentially vulnerable - -
Wikidata Redmine 3.1.2 Potentially vulnerable - -
Wikidata Redmine 3.1.1 Potentially vulnerable - -
Wikidata Redmine 3.1.0 Potentially vulnerable - -
Wikidata Redmine 3.0.7 Potentially vulnerable - -
Wikidata Redmine 3.0.6 Potentially vulnerable - -
Wikidata Redmine 3.0.5 Potentially vulnerable - -
Wikidata Redmine 3.0.4 Potentially vulnerable - -
Wikidata Redmine 3.0.3 Potentially vulnerable - -
Wikidata Redmine 3.0.2 Potentially vulnerable - -
Wikidata Redmine 3.0.1 Potentially vulnerable - -
Wikidata Redmine 3.0.0 Potentially vulnerable - -
Wikidata Redmine 2.6.10 Potentially vulnerable - -
Wikidata Redmine 2.6.9 Potentially vulnerable - -
Wikidata Redmine 2.6.8 Potentially vulnerable - -
Wikidata Redmine 2.6.7 Potentially vulnerable - -
Wikidata Redmine 2.6.6 Potentially vulnerable - -
Wikidata Redmine 2.6.5 Potentially vulnerable - -
Wikidata Redmine 2.6.4 Potentially vulnerable - -
Wikidata Redmine 2.6.3 Potentially vulnerable - -
Wikidata Redmine 2.6.2 Potentially vulnerable - -
Wikidata Redmine 2.6.1 Potentially vulnerable - -
Wikidata Redmine 2.6.0 Potentially vulnerable - -
Wikidata Redmine 2.5.3 Potentially vulnerable - -
Wikidata Redmine 2.5.2 Potentially vulnerable - -
Wikidata Redmine 2.5.1 Potentially vulnerable - -
Wikidata Redmine 2.5.0 Potentially vulnerable - -
Wikidata Redmine 2.4.7 Potentially vulnerable - -
Wikidata Redmine 2.4.6 Potentially vulnerable - -
Wikidata Redmine 2.4.5 Potentially vulnerable - -
Wikidata Redmine 2.4.4 Potentially vulnerable - -
Wikidata Redmine 2.4.3 Potentially vulnerable - -
Wikidata Redmine 2.4.2 Potentially vulnerable - -
Wikidata Redmine 2.4.1 Potentially vulnerable - -
Wikidata Redmine 2.4.0 Potentially vulnerable - -
Wikidata Redmine 2.3.4 Potentially vulnerable - -
Wikidata Redmine 2.3.3 Potentially vulnerable - -
Wikidata Redmine 2.3.2 Potentially vulnerable - -
Wikidata Redmine 2.3.1 Potentially vulnerable - -
Wikidata Redmine 2.3.0 Potentially vulnerable - -
Wikidata Redmine 2.2.4 Potentially vulnerable - -
Wikidata Redmine 2.2.3 Potentially vulnerable - -
Wikidata Redmine 2.2.2 Potentially vulnerable - -
Wikidata Redmine 2.2.1 Potentially vulnerable - -
Wikidata Redmine 2.2.0 Potentially vulnerable - -
Wikidata Redmine 2.1.6 Potentially vulnerable - -
Wikidata Redmine 2.1.5 Potentially vulnerable - -
Wikidata Redmine 2.1.4 Potentially vulnerable - -
Wikidata Redmine 2.1.3 Potentially vulnerable - -
Wikidata Redmine 2.1.2 Potentially vulnerable - -
Wikidata Redmine 2.1.1 Potentially vulnerable - -
Wikidata Redmine 2.1.0 Potentially vulnerable - -
Wikidata Redmine 2.0.4 Potentially vulnerable - -
Wikidata Redmine 2.0.3 Potentially vulnerable - -
Wikidata Redmine 2.0.2 Potentially vulnerable - -
Wikidata Redmine 2.0.1 Potentially vulnerable - -
Wikidata Redmine 2.0.0 Potentially vulnerable - -
Wikidata Redmine 1.4.7 Potentially vulnerable - -
Wikidata Redmine 1.4.6 Potentially vulnerable - -
Wikidata Redmine 1.4.5 Potentially vulnerable - -
Wikidata Redmine 1.4.4 Potentially vulnerable - -