Direct Vulnerabilities

Known vulnerabilities in the unbound package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
CVE-2026-42923

*
  • L
CVE-2026-40622

*
  • H
CVE-2026-41292

*
  • H
CVE-2026-42959

*
  • M
CVE-2026-44608

*
  • M
CVE-2026-32792

*
  • M
CVE-2026-44390

*
  • H
CVE-2026-42944

*
  • M
CVE-2026-42534

*
  • C
CVE-2026-33278

*
  • C
CVE-2026-42960

*
  • L
CVE-2025-11411

<1.22.0-2+deb13u1
  • L
CVE-2025-5994

<1.22.0-2
  • M
Improper Validation of Specified Quantity in Input

<1.21.1-1
  • L
NULL Pointer Dereference

<1.21.1-1
  • L
Heap-based Buffer Overflow

<1.20.0-1
  • L
CVE-2024-33655

<1.20.0-1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1.19.2-1
  • H
Allocation of Resources Without Limits or Throttling

<1.19.1-1
  • H
CVE-2023-50868

<1.19.1-1
  • H
Resource Exhaustion

<1.16.3-1
  • M
Insufficient Session Expiration

<1.16.2-1
  • M
Insufficient Session Expiration

<1.16.2-1
  • L
Reachable Assertion

<1.9.6-1
  • L
Integer Overflow or Wraparound

<1.9.6-1
  • L
Integer Overflow or Wraparound

<1.9.6-1
  • L
Reachable Assertion

<1.9.6-1
  • L
Integer Overflow or Wraparound

<1.9.6-1
  • L
Arbitrary Code Injection

<1.9.6-1
  • L
Out-of-bounds Write

<1.9.6-1
  • L
Integer Overflow or Wraparound

<1.9.6-1
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<1.9.6-1
  • L
Integer Overflow or Wraparound

<1.9.6-1
  • L
Reachable Assertion

<1.9.6-1
  • L
Out-of-bounds Write

<1.9.6-1
  • M
Link Following

<1.13.0-1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1.10.1-1
  • H
Uncontrolled Recursion

<1.10.1-1
  • L
Improper Input Validation

<1.9.6-1
  • H
Improper Handling of Exceptional Conditions

<1.9.4-1
  • M
Improper Input Validation

<1.7.1-1
  • M
Resource Management Errors

<1.4.22-3
  • M
Resource Management Errors

<1.4.14-1
  • M
Resource Management Errors

<1.4.14-1
  • L
Resource Management Errors

<1.4.4-1
  • L
Resource Management Errors

<1.4.10-1
  • M
Resource Management Errors

<1.4.3-1
  • L
Cryptographic Issues

<1.3.4-1