bind vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the bind package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
CVE-2025-40776

<9.20.11-r0
  • H
CVE-2025-40777

<9.20.11-r0
  • H
CVE-2024-0760

<9.18.28-r0
  • H
CVE-2024-1737

<9.18.28-r0
  • H
CVE-2024-1975

<9.18.28-r0
  • L
CVE-2023-50868

<9.18.24-r0
  • H
CVE-2022-3080

<9.18.7-r0
  • H
Memory Leak

<9.18.7-r0
  • L
CVE-2024-4076

<9.18.28-r0
  • M
Improper Privilege Management

<9.16.6-r0
  • H
Improper Input Validation

<9.16.6-r0
  • H
Memory Leak

<9.18.7-r0
  • H
Out-of-bounds Write

<9.18.19-r0
  • H
Reachable Assertion

<9.18.19-r0
  • M
CVE-2022-2795

<9.18.7-r0
  • H
Out-of-bounds Read

<9.18.7-r0
  • H
Allocation of Resources Without Limits or Throttling

<9.18.24-r0
  • M
Reachable Assertion

<9.16.4-r0
  • H
Reachable Assertion

<9.16.6-r0
  • M
CVE-2023-5680

<9.18.24-r0
  • H
Allocation of Resources Without Limits or Throttling

<9.18.24-r0
  • H
CVE-2023-5679

<9.18.24-r0
  • M
Reachable Assertion

<9.16.15-r0
  • H
Reachable Assertion

<9.16.15-r0
  • M
Reachable Assertion

<9.16.6-r0
  • M
CVE-2021-25219

<9.16.22-r0
  • H
CVE-2022-3736

<9.18.11-r0
  • M
HTTP Request Smuggling

<9.16.27-r0
  • H
Reachable Assertion

<9.18.24-r0
  • H
Improper Privilege Management

<9.16.6-r0
  • H
CVE-2025-40775

<9.20.9-r0
  • H
Memory Leak

<9.18.7-r0
  • H
CVE-2024-12705

<9.18.33-r0
  • H
Reachable Assertion

<9.16.20-r0
  • H
CVE-2024-11187

<9.18.33-r0
  • H
Reachable Assertion

<9.18.11-r0
  • H
Use After Free

<9.18.11-r0
  • H
CVE-2023-4408

<9.18.24-r0
  • M
Use of a Broken or Risky Cryptographic Algorithm

<9.12.3_p4-r0
  • H
Reachable Assertion

<9.14.7-r0
  • M
Race Condition

<9.14.4-r0
  • H
Missing Release of Resource after Effective Lifetime

<9.12.3_p4-r0
  • H
Reachable Assertion

<9.12.1_p2-r0
  • M
Reachable Assertion

<9.12.1_p2-r0
  • C
Reachable Assertion

<9.16.15-r0
  • H
Buffer Overflow

<9.16.11-r2
  • H
Reachable Assertion

<9.14.1-r0
  • H
Resource Exhaustion

<9.14.12-r0
  • H
Resource Exhaustion

<9.14.8-r0
  • M
Improper Resource Shutdown or Release

<9.16.4-r0
  • M
Improper Resource Shutdown or Release

<9.16.27-r0
  • H
Use After Free

<9.11.2_p1-r0
  • M
Reachable Assertion

<9.11.0_p5-r0
  • H
Insufficient Verification of Data Authenticity

<9.14.7-r0
  • H
Reachable Assertion

<9.11.0_p5-r0
  • M
Reachable Assertion

<9.14.12-r0
  • H
Allocation of Resources Without Limits or Throttling

<9.14.1-r0
  • M
Incorrect Permission Assignment for Critical Resource

<9.12.3_p4-r0
  • M
Reachable Assertion

<9.11.0_p5-r0
  • H
Improper Input Validation

<9.10.4_p5-r0
  • H
Information Exposure

<9.12.2_p1-r0
  • H
Reachable Assertion

<9.12.2_p1-r0
  • H
Improper Input Validation

<9.10.4_p5-r0
  • H
Improper Input Validation

<9.10.4_p5-r0