bind vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the bind package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
CVE-2024-4076

<9.18.31-r0
  • H
CVE-2024-1975

<9.18.31-r0
  • H
CVE-2024-0760

<9.18.31-r0
  • H
CVE-2024-1737

<9.18.31-r0
  • H
Memory Leak

<9.18.7-r0
  • M
CVE-2023-5680

<9.18.24-r0
  • H
Out-of-bounds Write

<9.18.19-r0
  • H
Reachable Assertion

<9.18.19-r0
  • H
Reachable Assertion

<9.18.24-r0
  • H
Memory Leak

<9.18.7-r0
  • H
Memory Leak

<9.18.7-r0
  • M
CVE-2021-25219

<9.16.22-r0
  • H
Out-of-bounds Read

<9.18.7-r0
  • M
CVE-2022-2795

<9.18.7-r0
  • H
Use After Free

<9.18.11-r0
  • H
Improper Privilege Management

<9.16.6-r0
  • H
CVE-2023-5679

<9.18.24-r0
  • H
CVE-2022-3736

<9.18.11-r0
  • H
Allocation of Resources Without Limits or Throttling

<9.18.24-r0
  • H
Reachable Assertion

<9.18.11-r0
  • H
Reachable Assertion

<9.16.20-r0
  • H
Allocation of Resources Without Limits or Throttling

<9.18.24-r0
  • M
Improper Privilege Management

<9.16.6-r0
  • H
Reachable Assertion

<9.16.15-r0
  • M
Reachable Assertion

<9.16.6-r0
  • H
Improper Input Validation

<9.16.6-r0
  • H
Resource Exhaustion

<9.14.12-r0
  • M
Reachable Assertion

<9.14.12-r0
  • M
Improper Resource Shutdown or Release

<9.16.27-r0
  • H
CVE-2023-4408

<9.18.24-r0
  • L
CVE-2023-50868

<9.18.24-r0
  • H
CVE-2022-3080

<9.18.7-r0
  • M
Reachable Assertion

<9.16.4-r0
  • M
Use of a Broken or Risky Cryptographic Algorithm

<9.12.3_p4-r0
  • C
Reachable Assertion

<9.16.15-r0
  • H
Reachable Assertion

<9.16.6-r0
  • M
Improper Resource Shutdown or Release

<9.16.4-r0
  • H
Buffer Overflow

<9.16.11-r2
  • M
HTTP Request Smuggling

<9.16.27-r0
  • M
Reachable Assertion

<9.16.15-r0
  • M
Incorrect Permission Assignment for Critical Resource

<9.12.3_p4-r0
  • H
Reachable Assertion

<9.14.7-r0
  • H
Reachable Assertion

<9.12.1_p2-r0
  • H
Insufficient Verification of Data Authenticity

<9.14.7-r0
  • H
Use After Free

<9.11.2_p1-r0
  • M
Race Condition

<9.14.4-r0
  • H
Resource Exhaustion

<9.14.8-r0
  • M
Reachable Assertion

<9.11.0_p5-r0
  • H
Reachable Assertion

<9.14.1-r0
  • H
Missing Release of Resource after Effective Lifetime

<9.12.3_p4-r0
  • H
Allocation of Resources Without Limits or Throttling

<9.14.1-r0
  • H
Reachable Assertion

<9.12.2_p1-r0
  • H
Reachable Assertion

<9.11.0_p5-r0
  • M
Reachable Assertion

<9.12.1_p2-r0
  • M
Reachable Assertion

<9.11.0_p5-r0
  • H
Improper Input Validation

<9.10.4_p5-r0
  • H
Improper Input Validation

<9.10.4_p5-r0
  • H
Improper Input Validation

<9.10.4_p5-r0
  • H
Information Exposure

<9.12.2_p1-r0