只搜尋版本: [buster] [buster-updates] [buster-backports] [bullseye] [bullseye-updates] [bullseye-backports] [bookworm] [bookworm-updates] [bookworm-backports] [trixie] [sid] [experimental]
只搜尋架構: [alpha] [amd64] [arm] [arm64] [armel] [armhf] [avr32] [hppa] [hurd-i386] [i386] [ia64] [kfreebsd-amd64] [kfreebsd-i386] [m68k] [mips] [mips64el] [mipsel] [powerpc] [powerpcspe] [ppc64] [ppc64el] [riscv64] [s390] [s390x] [sh4] [sparc] [sparc64] [x32]
在所有架構中搜索
由於引數界定了搜尋範圍,導致 0 個相關結果沒有列出。
您在所有發行版中 mips64el 架構下所有版面裡,指定關鍵字 ejabberd-mod-shcommands 在套件名稱中搜索的結果。 找到 1 個匹配的套件。
完整匹配
套件 ejabberd-mod-shcommands
- bullseye (oldstable) (net):
ejabberd module to execute shell commands via XMPP (dangerous!)
0.2020.10.21~dfsg0-5: mips64el - bullseye-backports (net):
ejabberd module to execute shell commands via XMPP (dangerous!)
0.2023.01.25~dfsg0-1~bpo11+1: mips64el - bookworm (stable) (net):
ejabberd module to execute shell commands via XMPP (dangerous!)
0.2023.01.25~dfsg0-1: mips64el - bookworm-backports (net):
ejabberd module to execute shell commands via XMPP (dangerous!)
0.2023.10.04~dfsg0-1~bpo12+1: mips64el - trixie (testing) (net):
ejabberd module to execute shell commands via XMPP (dangerous!)
0.2023.10.04~dfsg0-1: mips64el - sid (unstable) (net):
ejabberd module to execute shell commands via XMPP (dangerous!)
0.2024.07.18~dfsg0-1: mips64el