Versions Packages Information History CVEs Related Badges Report

Versions for tcpflow

114 package(s) known

Repository Package name Version Category Maintainer(s)
AIX Open Source Packages tcpflow 1.3.0 Potentially vulnerable - -
AIX Open Source Packages tcpflow 1.2.9 Potentially vulnerable - -
AIX Open Source Packages tcpflow 1.2.8 Potentially vulnerable - -
AIX Open Source Packages tcpflow 0.21 Potentially vulnerable - -
Alpine Linux 3.8
main
tcpflow-doc 1.5.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
tcpflow 1.5.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
tcpflow 1.5.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
tcpflow-doc 1.5.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
tcpflow-doc 1.5.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
tcpflow 1.5.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
tcpflow-doc 1.5.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
tcpflow 1.5.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
tcpflow 1.5.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
tcpflow-doc 1.5.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
tcpflow-doc 1.5.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
tcpflow 1.5.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
tcpflow 1.6.1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
tcpflow-doc 1.6.1 - ncopa@alpinelinux.org
ALT Linux p9 tcpflow 1.5.0 Potentially vulnerable Monitoring sbolshakov@altlinux.org
ALT Sisyphus tcpflow 1.5.0 Potentially vulnerable Monitoring sbolshakov@altlinux.org
Arch
community
tcpflow 1.6.1 - -
BlackArch tcpflow 1.6.1 - -
Debian Oldstable
oldstable/main
tcpflow 1.4.5 Potentially vulnerable net dkogan@debian.org
Debian Stable
stable/main
tcpflow 1.5.2 net dkogan@debian.org
Debian Testing
testing/main
tcpflow 1.5.2 net dkogan@debian.org
Debian Unstable
main
tcpflow 1.5.2 net dkogan@debian.org
Deepin
main
tcpflow 1.5.2 net dkogan@debian.org
Devuan 1.0 (Jessie)
jessie/main
tcpflow 1.4.4 Potentially vulnerable net dima@secretsauce.net
Devuan 2.0 (ASCII)
ascii/main
tcpflow 1.4.5 Potentially vulnerable net dkogan@debian.org
Devuan 3.0 (Beowulf)
beowulf/main
tcpflow 1.5.2 net dkogan@debian.org
Devuan 4.0 (Chimaera)
chimaera/main
tcpflow 1.5.2 net dkogan@debian.org
Devuan Unstable
unstable/main
tcpflow 1.5.2 net dkogan@debian.org
DPorts net/tcpflow 1.5.0 Potentially vulnerable net antoine@freebsd.org
EPEL 7 tcpflow 1.4.5 Potentially vulnerable Applications/Internet -
Fedora 26
release
tcpflow 1.4.5 Potentially vulnerable Applications/Internet -
Fedora 27
updates
tcpflow 1.5.0 Potentially vulnerable Unspecified -
Fedora 27
release
tcpflow 1.4.5 Potentially vulnerable Applications/Internet -
Fedora 28
updates
tcpflow 1.5.0 Potentially vulnerable Unspecified -
Fedora 28
release
tcpflow 1.4.5 Potentially vulnerable Applications/Internet -
Fedora 29
release
tcpflow 1.5.0 Potentially vulnerable Unspecified -
Fedora 29
updates
tcpflow 1.5.0 Potentially vulnerable Unspecified -
Fedora 30
release
tcpflow 1.5.0 Potentially vulnerable Unspecified -
Fedora 31
release
tcpflow 1.5.0 Potentially vulnerable Unspecified -
Fedora 32
updates
tcpflow 1.6.1 Unspecified -
Fedora 32
release
tcpflow 1.5.0 Potentially vulnerable Unspecified -
Fedora 33
updates
tcpflow 1.6.1 Unspecified -
Fedora 33
release
tcpflow 1.5.0 Potentially vulnerable Unspecified -
Fedora Rawhide tcpflow 1.6.1 Unspecified -
FreeBSD Ports net/tcpflow 1.5.0 Potentially vulnerable net antoine@freebsd.org
Funtoo 1.4
net-kit
net-analyzer/tcpflow 1.5.2 net-analyzer netmon@gentoo.org
Funtoo 1.4
net-kit
net-analyzer/tcpflow 1.4.5_p4 Potentially vulnerable net-analyzer netmon@gentoo.org
Funtoo 1.4
net-kit
net-analyzer/tcpflow 1.4.5_p1 Potentially vulnerable net-analyzer netmon@gentoo.org
Gentoo net-analyzer/tcpflow 1.6.1 net-analyzer netmon@gentoo.org
Homebrew tcpflow 1.6.1 - -
HP-UX 11.31
hppa_32
tcpflow 0.21 Potentially vulnerable - -
HP-UX 11.31
ia64_32
tcpflow 0.21 Potentially vulnerable - -
HP-UX 11.31
ia64_64
tcpflow 0.21 Potentially vulnerable - -
Hyperbola
community
tcpflow 1.4.5 Potentially vulnerable - -
Kali Linux Rolling
main
tcpflow 1.5.2 net dkogan@debian.org
LiGurOS stable net-analyzer/tcpflow 1.6.1 net-analyzer netmon@gentoo.org
LiGurOS develop net-analyzer/tcpflow 1.6.1 net-analyzer netmon@gentoo.org
Linuxbrew tcpflow 1.6.1 - -
MacPorts tcpflow 1.5.2 net nomaintainer@macports.org
Mageia 6
core/updates
tcpflow 1.5.2 Networking/Other -
Mageia 6
core/updates
tcpflow 1.5.0 Potentially vulnerable Networking/Other -
Mageia 6
core/release
tcpflow 1.4.4 Potentially vulnerable Networking/Other -
Mageia 7
core/release
tcpflow 1.5.2 Networking/Other -
Mageia 8
core/release
tcpflow 1.5.2 Networking/Other -
Mageia Cauldron
core/release
tcpflow 1.5.2 Networking/Other -
Manjaro Stable
community
tcpflow 1.6.1 - -
Manjaro Testing
community
tcpflow 1.6.1 - -
Manjaro Unstable
community
tcpflow 1.6.1 - -
nixpkgs stable tcpflow 1.5.2 - dev.primeos@gmail.com, 7c6f434c@mail.ru, obadz-nixos@obadz.com
nixpkgs unstable tcpflow 1.6.1 - 7c6f434c@mail.ru, obadz-nixos@obadz.com
OpenBSD Ports net/tcpflow 0.21 Potentially vulnerable net ports@openbsd.org
openSUSE Leap 42.3
main/oss
tcpflow 1.4.4 Potentially vulnerable Productivity/Networking/Diagnostic -
openSUSE Leap 15.0
main/oss
tcpflow 1.4.5 Potentially vulnerable Productivity/Networking/Diagnostic -
openSUSE Leap 15.1
main/oss
tcpflow 1.4.5 Potentially vulnerable Productivity/Networking/Diagnostic -
openSUSE Leap 15.2
main/oss
tcpflow 1.4.5 Potentially vulnerable Productivity/Networking/Diagnostic -
openSUSE Leap 15.3
main/oss
tcpflow 1.4.5 Potentially vulnerable Productivity/Networking/Diagnostic -
openSUSE Tumbleweed tcpflow 1.6.1 Productivity/Networking/Diagnostic -
openSUSE Security Tumbleweed tcpflow 1.6.1 Productivity/Networking/Diagnostic -
Parabola
community
tcpflow 1.6.1 - -
Pardus 17
main
tcpflow 1.4.5 Potentially vulnerable net dkogan@debian.org
Pardus 19
main
tcpflow 1.5.2 net dkogan@debian.org
Parrot
main
tcpflow 1.5.2 net dkogan@debian.org
pkgsrc current net/tcpflow 1.5.0 Potentially vulnerable net pkgsrc-users@netbsd.org
PLD Linux tcpflow 1.5.2 - -
PureOS Amber tcpflow 1.5.2 misc dkogan@debian.org
PureOS landing tcpflow 1.5.2 misc dkogan@debian.org
Raspbian Oldstable
main
tcpflow 1.4.5 Potentially vulnerable net dkogan@debian.org
Raspbian Stable
main
tcpflow 1.5.2 net dkogan@debian.org
Raspbian Testing
main
tcpflow 1.5.2 net dkogan@debian.org
Rosa 2014.1
contrib/updates
tcpflow 1.4.4 Potentially vulnerable - -
Rosa 2014.1
contrib/release
tcpflow 1.3.0 Potentially vulnerable - -
Rosa 2016.1
contrib/release
tcpflow 1.4.4 Potentially vulnerable - -
Rosa 2019.1
contrib/release
tcpflow 1.4.4 Potentially vulnerable Networking/Other m.novosyolov@rosalinux.ru
SlackBuilds network/tcpflow 1.5.0 Potentially vulnerable network -
T2 SDE tcpflow 0.21 Potentially vulnerable extra/tool t2@t2-project.org
Trisquel 6.0
toutatis/main
tcpflow 0.21.ds1 Potentially vulnerable universe/net rfrancoise@debian.org
Trisquel 7.0
belenos/main
tcpflow 1.4.4 Potentially vulnerable universe/net dima@secretsauce.net
Trisquel 8.0
flidas/main
tcpflow 1.4.5 Potentially vulnerable universe/net dima@secretsauce.net
Trisquel 8.0
flidas-updates/main
tcpflow 1.4.5 Potentially vulnerable universe/net ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 9.0
etiona/main
tcpflow 1.4.5 Potentially vulnerable universe/net ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 9.0
etiona-updates/main
tcpflow 1.4.5 Potentially vulnerable universe/net ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 12.04
precise/universe
tcpflow 0.21.ds1 Potentially vulnerable universe/net rfrancoise@debian.org
Ubuntu 14.04
trusty/universe
tcpflow 1.4.4 Potentially vulnerable universe/net dima@secretsauce.net
Ubuntu 16.04
xenial/universe
tcpflow 1.4.5 Potentially vulnerable universe/net dima@secretsauce.net
Ubuntu 16.04
xenial-updates/universe
tcpflow 1.4.5 Potentially vulnerable universe/net ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 18.04
bionic/universe
tcpflow 1.4.5 Potentially vulnerable universe/net ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 18.04
bionic-updates/universe
tcpflow 1.4.5 Potentially vulnerable universe/net ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 20.04
focal/universe
tcpflow 1.5.2 universe/net dkogan@debian.org
Ubuntu 20.10
groovy/universe
tcpflow 1.5.2 universe/net dkogan@debian.org
Void Linux x86_64
x86_64
tcpflow 1.5.2 - orphan@voidlinux.org