Versions Packages Information History CVEs Related Badges Report

Information for wireshark

Versions

  • 9999
  • 4.1.0rc0
  • 4.1.0rc0.r1576.ge7d5c49fe1
  • 4.0.4 (28)
  • 4.0.4.0
  • 4.0.3 Potentially vulnerable (11)
  • 4.0.3.0 Potentially vulnerable
  • 4.0.2 Potentially vulnerable (3)
  • 4.0.2.0 Potentially vulnerable
  • 4.0.1 Potentially vulnerable (4)
  • 4.0.1.0 Potentially vulnerable
  • 4.0.0 Potentially vulnerable (3)
  • 4.0.0.0 Potentially vulnerable
  • 4 Potentially vulnerable
  • 3.7.1
  • 3.6.12 (3)
  • 3.6.11 Potentially vulnerable (3)
  • 3.6.10 Potentially vulnerable
  • 3.6.9 Potentially vulnerable (2)
  • 3.6.8 Potentially vulnerable (4)
  • 3.6.8.0 Potentially vulnerable
  • 3.6.7 Potentially vulnerable (2)
  • 3.6.7.0 Potentially vulnerable
  • 3.6.6.0 Potentially vulnerable
  • 3.6.6 Potentially vulnerable
  • 3.6.5 Potentially vulnerable (2)
  • 3.6.5.0 Potentially vulnerable
  • 3.6.3.0 Potentially vulnerable
  • 3.6.2 Potentially vulnerable (5)
  • 3.6.2.0 Potentially vulnerable
  • 3.6.1.0 Potentially vulnerable
  • 3.6.1 Potentially vulnerable
  • 3.6.0.0 Potentially vulnerable
  • 3.6.0 Potentially vulnerable
  • 3.4.16 Potentially vulnerable
  • 3.4.13 Potentially vulnerable
  • 3.4.12 Potentially vulnerable (2)
  • 3.4.11 Potentially vulnerable
  • 3.4.10 Potentially vulnerable (4)
  • 3.4.10.0 Potentially vulnerable
  • 3.4.9.0 Potentially vulnerable
  • 3.4.9 Potentially vulnerable
  • 3.4.8 Potentially vulnerable (4)
  • 3.4.8.0 Potentially vulnerable
  • 3.4.7 Potentially vulnerable (3)
  • 3.4.7.0 Potentially vulnerable
  • 3.4.6 Potentially vulnerable (5)
  • 3.4.5 Potentially vulnerable (3)
  • 3.4.4 Potentially vulnerable (3)
  • 3.4.3 Potentially vulnerable (3)
  • 3.4.1 Potentially vulnerable (2)
  • 3.4.0 Potentially vulnerable
  • 3.2.10 Potentially vulnerable
  • 3.2.8 Potentially vulnerable
  • 3.2.7 Potentially vulnerable (3)
  • 3.2.6 Potentially vulnerable
  • 3.2.5 Potentially vulnerable (2)
  • 3.2.4 Potentially vulnerable
  • 3.2.3 Potentially vulnerable (2)
  • 3.2.2 Potentially vulnerable (2)
  • 3.2.1 Potentially vulnerable (2)
  • 3.2.0 Potentially vulnerable
  • 3.0.14 Potentially vulnerable (2)
  • 3.0.13 Potentially vulnerable
  • 3.0.12 Potentially vulnerable
  • 3.0.11 Potentially vulnerable
  • 3.0.10 Potentially vulnerable
  • 3.0.9 Potentially vulnerable (2)
  • 3.0.8 Potentially vulnerable
  • 3.0.7 Potentially vulnerable
  • 3.0.5 Potentially vulnerable
  • 3.0.4 Potentially vulnerable
  • 3.0.3 Potentially vulnerable (3)
  • 3.0.2 Potentially vulnerable
  • 3.0.1 Potentially vulnerable (2)
  • 3.0 Potentially vulnerable
  • 2.6.20.2 Potentially vulnerable
  • 2.6.20.1 Potentially vulnerable
  • 2.6.20 Potentially vulnerable (4)
  • 2.6.19 Potentially vulnerable
  • 2.6.10 Potentially vulnerable
  • 2.6.7 Potentially vulnerable (2)
  • 2.6.6 Potentially vulnerable (2)
  • 2.6.5 Potentially vulnerable
  • 2.6.3 Potentially vulnerable
  • 2.6.2 Potentially vulnerable (2)
  • 2.6.1 Potentially vulnerable
  • 2.6.0 Potentially vulnerable
  • 2.4.16 Potentially vulnerable
  • 2.4.15 Potentially vulnerable
  • 2.4.14 Potentially vulnerable
  • 2.4.13 Potentially vulnerable
  • 2.4.12 Potentially vulnerable (2)
  • 2.4.11 Potentially vulnerable
  • 2.4.10 Potentially vulnerable
  • 2.4.9 Potentially vulnerable
  • 2.4.8 Potentially vulnerable
  • 2.4.6 Potentially vulnerable (2)
  • 2.4.5 Potentially vulnerable (3)
  • 2.4.4 Potentially vulnerable
  • 2.4.3 Potentially vulnerable
  • 2.4.2 Potentially vulnerable
  • 2.4.1 Potentially vulnerable
  • 2.4.0 Potentially vulnerable (2)
  • 2.2.17 Potentially vulnerable (3)
  • 2.2.16 Potentially vulnerable (2)
  • 2.2.15 Potentially vulnerable (2)
  • 2.2.14 Potentially vulnerable (2)
  • 2.2.13 Potentially vulnerable (2)
  • 2.2.12 Potentially vulnerable (2)
  • 2.2.11 Potentially vulnerable (2)
  • 2.2.10 Potentially vulnerable (3)
  • 2.2.9 Potentially vulnerable (2)
  • 2.2.8 Potentially vulnerable (3)
  • 2.2.7 Potentially vulnerable (3)
  • 2.2.6+g32dac6a Potentially vulnerable
  • 2.2.6 Potentially vulnerable
  • 2.2.5 Potentially vulnerable
  • 2.2.4 Potentially vulnerable (2)
  • 2.2.3 Potentially vulnerable
  • 2.2.2 Potentially vulnerable
  • 2.2.1 Potentially vulnerable
  • 2.2.0 Potentially vulnerable
  • 2.1.1 Potentially vulnerable
  • 2.1.0 Potentially vulnerable
  • 2.0.16 Potentially vulnerable
  • 2.0.15 Potentially vulnerable (2)
  • 2.0.14 Potentially vulnerable
  • 2.0.13 Potentially vulnerable
  • 2.0.12 Potentially vulnerable
  • 2.0.11 Potentially vulnerable
  • 2.0.10 Potentially vulnerable
  • 2.0.9 Potentially vulnerable
  • 2.0.8 Potentially vulnerable
  • 2.0.7 Potentially vulnerable
  • 2.0.6 Potentially vulnerable
  • 2.0.5 Potentially vulnerable
  • 2.0.4 Potentially vulnerable
  • 2.0.3 Potentially vulnerable
  • 2.0.2+ga16e22e Potentially vulnerable
  • 2.0.2 Potentially vulnerable (2)
  • 2.0.1 Potentially vulnerable
  • 1.12.2 Potentially vulnerable
  • 1.12.1+g01b65bf Potentially vulnerable
  • 1.12.1 Potentially vulnerable
  • 1.12.0 Potentially vulnerable
  • 1.10.14 Potentially vulnerable (3)
  • 1.10.13 Potentially vulnerable
  • 1.10.12 Potentially vulnerable
  • 1.10.11 Potentially vulnerable
  • 1.10.10 Potentially vulnerable
  • 1.10.9 Potentially vulnerable (2)
  • 1.10.8 Potentially vulnerable
  • 1.10.7 Potentially vulnerable
  • 1.10.6 Potentially vulnerable (2)
  • 1.10.5 Potentially vulnerable (2)
  • 1.10.4 Potentially vulnerable
  • 1.10.3 Potentially vulnerable (2)
  • 1.10.2 Potentially vulnerable
  • 1.10.1 Potentially vulnerable
  • 1.10.0 Potentially vulnerable
  • 1.8.15 Potentially vulnerable
  • 1.8.14 Potentially vulnerable
  • 1.8.13 Potentially vulnerable
  • 1.8.12 Potentially vulnerable
  • 1.8.11 Potentially vulnerable
  • 1.8.10 Potentially vulnerable (3)
  • 1.8.9 Potentially vulnerable
  • 1.8.8 Potentially vulnerable
  • 1.8.7 Potentially vulnerable
  • 1.8.6 Potentially vulnerable
  • 1.8.5 Potentially vulnerable
  • 1.8.4 Potentially vulnerable (2)
  • 1.8.3 Potentially vulnerable
  • 1.8.2 Potentially vulnerable (2)
  • 1.8.1 Potentially vulnerable
  • 1.8.0 Potentially vulnerable
  • 1.8 Potentially vulnerable
  • 1.6.16 Potentially vulnerable
  • 1.6.15 Potentially vulnerable
  • 1.6.14 Potentially vulnerable
  • 1.6.13 Potentially vulnerable
  • 1.6.12 Potentially vulnerable
  • 1.6.11 Potentially vulnerable
  • 1.6.9 Potentially vulnerable
  • 1.6.8 Potentially vulnerable (2)
  • 1.6.7 Potentially vulnerable (3)
  • 1.6.6 Potentially vulnerable
  • 1.6.5 Potentially vulnerable (2)
  • 1.6.4 Potentially vulnerable (2)
  • 1.6.3 Potentially vulnerable (2)
  • 1.6.2 Potentially vulnerable (2)
  • 1.6.1 Potentially vulnerable
  • 1.6 Potentially vulnerable
  • 1.4.15 Potentially vulnerable
  • 1.4.13 Potentially vulnerable
  • 1.4.12 Potentially vulnerable
  • 1.4.11 Potentially vulnerable
  • 1.4.10 Potentially vulnerable
  • 1.4.9 Potentially vulnerable
  • 1.4.6 Potentially vulnerable
  • 1.4.4 Potentially vulnerable
  • 1.4.3 Potentially vulnerable
  • 1.2.18 Potentially vulnerable
  • 1.2.12 Potentially vulnerable
  • 1.2.11 Potentially vulnerable
  • 1.2.10 Potentially vulnerable
  • 1.2.9 Potentially vulnerable
  • 1.2.8 Potentially vulnerable

Package names

  • Wireshark (3)
  • Wireshark64
  • mingw-w64-wireshark
  • tshark (3)
  • wireshark (45)
  • wireshark-cli
  • wireshark-git
  • wireshark-gtk2
  • wireshark-nox11
  • wireshark-qt (2)
  • wireshark2
  • wireshark22
  • wireshark3 (2)
  • wireshark3.6
  • wireshark30
  • wireshark4

Repositories

Categories

  • Applications/Internet (3)
  • Monitoring (5)
  • Network/Monitoring
  • Networking
  • Productivity/Networking/Diagnostic
  • Security
  • Unspecified (2)
  • analyzer
  • app:gui
  • extra/network
  • misc
  • net (9)
  • net-analyzer (3)
  • network (2)
  • universe/net

Licenses

  • GNU GPL
  • GNU GPL v2
  • GNU General Public License, version 2.0 or later
  • GPL (3)
  • GPL+ (2)
  • GPL-2 (2)
  • GPL-2.0+ AND GPL-3.0+
  • GPL-2.0+ and GPL-3.0+
  • GPL-2.0-or-later (4)
  • GPL-2.0-or-later AND GPL-3.0-or-later
  • GPL-3
  • GPL2 (4)
  • GPLv2 (3)
  • GPLv2+ and GPLv3 (3)
  • GPLv2+ and GPLv3+
  • gpl2

Summaries

  • A Network Traffic Analyser
  • A free network protocol analyzer
  • A free network protocol analyzer for Unix/Linux. GIT version
  • A network protocol analyzer (2)
  • A network protocol analyzer (development files)
  • A network protocol analyzer (documentation)
  • A network protocol analyzer - GTK version
  • A network protocol analyzer - GTK version (development files)
  • A network protocol analyzer - GTK version (documentation)
  • A network protocol analyzer formerly known as ethereal
  • A network protocol analyzer, also known as a sniffer
  • Award-winning network protocol analyzer
  • Command-line network protocol analyzer
  • Detached debugging symbols for wireshark
  • Graphical network analyzer and capture tool (2)
  • Graphical network protocol analyzer
  • Libraries and Tools used by Wireshark and TShark Network protocol analyzers
  • Network Sniffer
  • Network Sniffer & Decoder
  • Network packet analyzer that will try to capture network packets and tries to display that packet data as detailed as possible
  • Network protoccol analyzer (Common files)
  • Network protoccol analyzer (Console version)
  • Network protocol analyzer (4)
  • Network protocol analyzer (Console version)
  • Network protocol analyzer (development files)
  • Network protocol analyzer (documentation)
  • Network protocol analyzer (sniffer)
  • Network protocol analyzer - Qt frontend
  • Network protocol analyzer - development files
  • Network protocol analyzer - library
  • Network protocol analyzer and sniffer
  • Network traffic analyzer (10)
  • Network traffic and protocol analyzer/sniffer
  • Network traffic and protocol analyzer/sniffer (mingw-w64)
  • Network traffic and protocol analyzer/sniffer - CLI tools and data files
  • Network traffic and protocol analyzer/sniffer - Qt GUI
  • Powerful network analyzer/capture tool
  • Powerful network analyzer/capture tool (without GUI)
  • Powerful network protocol analyzer
  • The BugTraq Award Winning Network Traffic Analyzer
  • Wireshark
  • Wireshark is an award-winning network protocol analyzer
  • Wireshark is an award-winning network protocol analyzer.
  • Wireshark is the world's foremost network protocol analyzer, and is the de facto (and often de jure) standard across many industries and educational institutions.
  • Wireshark: a network protocol analyzer
  • a free network protocol analyzer for Unix/Linux and Windows - GTK2 frontend
  • graphical network protocol analyzer, Qt user-interface
  • network protoccol analyzer - common files
  • network protoccol analyzer - console version
  • network protocol analyzer
  • network protocol analyzer - GTK version
  • network protocol analyzer - GTK version (development files)
  • network protocol analyzer - GTK version (documentation)
  • network protocol analyzer, formerly known as Ethereal
  • wireshark - GTK GUI

Maintainers

All package recipes

Downloads

Patches

Build logs