bind vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the bind package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
CVE-2024-1975

<9.18.31-r0
  • H
CVE-2024-0760

<9.18.31-r0
  • L
CVE-2024-4076

<9.18.31-r0
  • H
CVE-2024-1737

<9.18.31-r0
  • H
Allocation of Resources Without Limits or Throttling

<9.18.24-r0
  • H
CVE-2023-5679

<9.18.24-r0
  • H
CVE-2023-4408

<9.18.24-r0
  • H
Reachable Assertion

<9.18.24-r0
  • L
CVE-2023-50868

<9.18.24-r0
  • H
Allocation of Resources Without Limits or Throttling

<9.18.24-r0
  • M
CVE-2023-5680

<9.18.24-r0
  • H
Reachable Assertion

<9.18.19-r0
  • H
Out-of-bounds Write

<9.18.19-r0
  • H
Use After Free

<9.18.11-r0
  • H
Reachable Assertion

<9.18.11-r0
  • H
CVE-2022-3736

<9.18.11-r0
  • H
Memory Leak

<9.18.7-r0
  • H
Memory Leak

<9.18.7-r0
  • H
Out-of-bounds Read

<9.18.7-r0
  • H
CVE-2022-3080

<9.18.7-r0
  • H
Memory Leak

<9.18.7-r0
  • M
CVE-2022-2795

<9.18.7-r0
  • M
HTTP Request Smuggling

<9.16.27-r0
  • M
Improper Resource Shutdown or Release

<9.16.27-r0
  • M
CVE-2021-25219

<9.16.22-r0
  • H
Reachable Assertion

<9.16.20-r0
  • C
Reachable Assertion

<9.16.15-r0
  • H
Reachable Assertion

<9.16.15-r0
  • M
Reachable Assertion

<9.16.15-r0
  • H
Buffer Overflow

<9.16.11-r2
  • H
Improper Privilege Management

<9.16.6-r0
  • M
Improper Privilege Management

<9.16.6-r0
  • M
Reachable Assertion

<9.16.6-r0
  • H
Improper Input Validation

<9.16.6-r0
  • H
Reachable Assertion

<9.16.6-r0
  • M
Improper Resource Shutdown or Release

<9.16.4-r0
  • M
Reachable Assertion

<9.16.4-r0
  • H
Resource Exhaustion

<9.14.12-r0
  • M
Reachable Assertion

<9.14.12-r0
  • H
Resource Exhaustion

<9.14.8-r0
  • H
Reachable Assertion

<9.14.7-r0
  • H
Insufficient Verification of Data Authenticity

<9.14.7-r0
  • M
Race Condition

<9.14.4-r0
  • H
Reachable Assertion

<9.14.1-r0
  • H
Allocation of Resources Without Limits or Throttling

<9.14.1-r0
  • H
Missing Release of Resource after Effective Lifetime

<9.12.3_p4-r0
  • M
Incorrect Permission Assignment for Critical Resource

<9.12.3_p4-r0
  • M
Use of a Broken or Risky Cryptographic Algorithm

<9.12.3_p4-r0
  • H
Reachable Assertion

<9.12.2_p1-r0
  • H
Use After Free

<9.11.2_p1-r0
  • H
Reachable Assertion

<9.12.1_p2-r0
  • H
Reachable Assertion

<9.11.0_p5-r0
  • M
Reachable Assertion

<9.11.0_p5-r0
  • M
Reachable Assertion

<9.12.1_p2-r0
  • H
Information Exposure

<9.12.2_p1-r0
  • M
Reachable Assertion

<9.11.0_p5-r0
  • H
Improper Input Validation

<9.10.4_p5-r0
  • H
Improper Input Validation

<9.10.4_p5-r0
  • H
Improper Input Validation

<9.10.4_p5-r0