Limit to suite: [buster] [buster-updates] [buster-backports] [bullseye] [bullseye-updates] [bullseye-backports] [bookworm] [bookworm-updates] [bookworm-backports] [trixie] [sid] [experimental]
Limit to a architecture: [alpha] [amd64] [arm] [arm64] [armel] [armhf] [avr32] [hppa] [hurd-i386] [i386] [ia64] [kfreebsd-amd64] [kfreebsd-i386] [m68k] [mips] [mips64el] [mipsel] [powerpc] [powerpcspe] [ppc64] [ppc64el] [riscv64] [s390] [s390x] [sh4] [sparc] [sparc64] [x32]
You have searched for packages that names contain ejabberd-mod-shcommands in all suites, all sections, and all architectures. Found 1 matching packages.
Exact hits
Package ejabberd-mod-shcommands
- buster (oldoldstable) (net):
execute shell commands via XMPP (dangerous!)
0.2018.12.10~dfsg0-3: amd64 arm64 armhf i386 - bullseye (oldstable) (net):
ejabberd module to execute shell commands via XMPP (dangerous!)
0.2020.10.21~dfsg0-5: amd64 arm64 armel armhf i386 mips64el mipsel ppc64el s390x - bullseye-backports (net):
ejabberd module to execute shell commands via XMPP (dangerous!)
0.2023.01.25~dfsg0-1~bpo11+1: amd64 arm64 armel armhf i386 mips64el mipsel ppc64el s390x - bookworm (stable) (net):
ejabberd module to execute shell commands via XMPP (dangerous!)
0.2023.01.25~dfsg0-1: amd64 arm64 armel armhf i386 mips64el mipsel ppc64el s390x - bookworm-backports (net):
ejabberd module to execute shell commands via XMPP (dangerous!)
0.2023.10.04~dfsg0-1~bpo12+1: amd64 arm64 armel armhf i386 mips64el mipsel ppc64el s390x - trixie (testing) (net):
ejabberd module to execute shell commands via XMPP (dangerous!)
0.2023.10.04~dfsg0-1: amd64 arm64 armel armhf i386 mips64el ppc64el riscv64 s390x - sid (unstable) (net):
ejabberd module to execute shell commands via XMPP (dangerous!)
0.2024.07.18~dfsg0-1: amd64 arm64 armhf i386 mips64el ppc64 ppc64el riscv64 s390x sparc64 x32
0.2023.10.04~dfsg0-1 [debports]: alpha armel hppa m68k
0.2023.01.25~dfsg0-1 [debports]: sh4
0.2021.07.07~dfsg0-1 [debports]: ia64