bind vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the bind package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
CVE-2024-1737

<9.18.31-r0
  • H
CVE-2024-0760

<9.18.31-r0
  • L
CVE-2024-4076

<9.18.31-r0
  • H
CVE-2024-1975

<9.18.31-r0
  • H
CVE-2023-4408

<9.18.24-r0
  • L
CVE-2023-50868

<9.18.24-r0
  • H
Reachable Assertion

<9.18.24-r0
  • H
Allocation of Resources Without Limits or Throttling

<9.18.24-r0
  • M
CVE-2023-5680

<9.18.24-r0
  • H
Allocation of Resources Without Limits or Throttling

<9.18.24-r0
  • H
CVE-2023-5679

<9.18.24-r0
  • H
Memory Leak

<9.18.7-r0
  • H
Memory Leak

<9.18.7-r0
  • H
Memory Leak

<9.18.7-r0
  • H
Reachable Assertion

<9.16.6-r0
  • H
Reachable Assertion

<9.18.19-r0
  • M
CVE-2022-2795

<9.18.7-r0
  • M
Improper Resource Shutdown or Release

<9.16.4-r0
  • H
CVE-2022-3080

<9.18.7-r0
  • H
Out-of-bounds Read

<9.18.7-r0
  • M
HTTP Request Smuggling

<9.16.27-r0
  • M
CVE-2021-25219

<9.16.22-r0
  • H
Reachable Assertion

<9.18.11-r0
  • H
Use After Free

<9.18.11-r0
  • H
Out-of-bounds Write

<9.18.19-r0
  • M
Reachable Assertion

<9.16.6-r0
  • H
Improper Input Validation

<9.16.6-r0
  • H
Improper Privilege Management

<9.16.6-r0
  • H
CVE-2022-3736

<9.18.11-r0
  • M
Reachable Assertion

<9.16.4-r0
  • H
Missing Release of Resource after Effective Lifetime

<9.12.3_p4-r0
  • H
Reachable Assertion

<9.14.1-r0
  • H
Allocation of Resources Without Limits or Throttling

<9.14.1-r0
  • M
Use of a Broken or Risky Cryptographic Algorithm

<9.12.3_p4-r0
  • M
Incorrect Permission Assignment for Critical Resource

<9.12.3_p4-r0
  • M
Improper Resource Shutdown or Release

<9.16.27-r0
  • M
Improper Privilege Management

<9.16.6-r0
  • M
Reachable Assertion

<9.16.15-r0
  • H
Reachable Assertion

<9.16.15-r0
  • H
Reachable Assertion

<9.16.20-r0
  • H
Reachable Assertion

<9.14.7-r0
  • M
Reachable Assertion

<9.11.0_p5-r0
  • C
Reachable Assertion

<9.16.15-r0
  • H
Insufficient Verification of Data Authenticity

<9.14.7-r0
  • H
Buffer Overflow

<9.16.11-r2
  • H
Reachable Assertion

<9.12.2_p1-r0
  • M
Race Condition

<9.14.4-r0
  • H
Resource Exhaustion

<9.14.12-r0
  • H
Resource Exhaustion

<9.14.8-r0
  • H
Information Exposure

<9.12.2_p1-r0
  • H
Reachable Assertion

<9.11.0_p5-r0
  • M
Reachable Assertion

<9.14.12-r0
  • H
Improper Input Validation

<9.10.4_p5-r0
  • H
Reachable Assertion

<9.12.1_p2-r0
  • M
Reachable Assertion

<9.12.1_p2-r0
  • H
Use After Free

<9.11.2_p1-r0
  • M
Reachable Assertion

<9.11.0_p5-r0
  • H
Improper Input Validation

<9.10.4_p5-r0
  • H
Improper Input Validation

<9.10.4_p5-r0