Limiter à la suite : [buster] [buster-updates] [buster-backports] [bullseye] [bullseye-updates] [bullseye-backports] [bookworm] [bookworm-updates] [bookworm-backports] [trixie] [sid] [experimental]
Limiter à l'architecture : [alpha] [amd64] [arm] [arm64] [armel] [armhf] [avr32] [hppa] [hurd-i386] [i386] [ia64] [kfreebsd-amd64] [kfreebsd-i386] [m68k] [mips] [mips64el] [mipsel] [powerpc] [powerpcspe] [ppc64] [ppc64el] [riscv64] [s390] [s390x] [sh4] [sparc] [sparc64] [x32]
Chercher dans toutes les architectures
Certains résultats n'ont pas été affichés en raison des paramètres de recherche.
Vous avez recherché des paquets dont les noms contiennent ejabberd-mod-shcommands dans toutes les suites, toutes les sections, et architecture(s) armhf. 1 paquets correspondants trouvés.
Résultats exacts
Paquet ejabberd-mod-shcommands
- buster (oldoldstable) (net):
execute shell commands via XMPP (dangerous!)
0.2018.12.10~dfsg0-3: armhf - bullseye (oldstable) (net):
ejabberd module to execute shell commands via XMPP (dangerous!)
0.2020.10.21~dfsg0-5: armhf - bullseye-backports (net):
ejabberd module to execute shell commands via XMPP (dangerous!)
0.2023.01.25~dfsg0-1~bpo11+1: armhf - bookworm (stable) (net):
ejabberd module to execute shell commands via XMPP (dangerous!)
0.2023.01.25~dfsg0-1: armhf - bookworm-backports (net):
ejabberd module to execute shell commands via XMPP (dangerous!)
0.2023.10.04~dfsg0-1~bpo12+1: armhf - sid (unstable) (net):
ejabberd module to execute shell commands via XMPP (dangerous!)
0.2024.07.18~dfsg0-1: armhf