Limit to suite: [buster] [buster-updates] [buster-backports] [bullseye] [bullseye-updates] [bullseye-backports] [bookworm] [bookworm-updates] [bookworm-backports] [trixie] [sid] [experimental]
Limit to a architecture: [alpha] [amd64] [arm] [arm64] [armel] [armhf] [avr32] [hppa] [hurd-i386] [i386] [ia64] [kfreebsd-amd64] [kfreebsd-i386] [m68k] [mips] [mips64el] [mipsel] [powerpc] [powerpcspe] [ppc64] [ppc64el] [riscv64] [s390] [s390x] [sh4] [sparc] [sparc64] [x32]
Zoek in alle platforms
Some results have not been displayed due to the search parameters.
You have searched for pakketten that names contain ejabberd-mod-shcommands in alle suites, alle secties, and platform(s) mips64el. Found 1 matching packages.
Exacte resultaten
Pakket ejabberd-mod-shcommands
- bullseye (oldstable) (net):
ejabberd module to execute shell commands via XMPP (dangerous!)
0.2020.10.21~dfsg0-5: mips64el - bullseye-backports (net):
ejabberd module to execute shell commands via XMPP (dangerous!)
0.2023.01.25~dfsg0-1~bpo11+1: mips64el - bookworm (stable) (net):
ejabberd module to execute shell commands via XMPP (dangerous!)
0.2023.01.25~dfsg0-1: mips64el - bookworm-backports (net):
ejabberd module to execute shell commands via XMPP (dangerous!)
0.2023.10.04~dfsg0-1~bpo12+1: mips64el - trixie (testing) (net):
ejabberd module to execute shell commands via XMPP (dangerous!)
0.2023.10.04~dfsg0-1: mips64el - sid (unstable) (net):
ejabberd module to execute shell commands via XMPP (dangerous!)
0.2024.07.18~dfsg0-1: mips64el