Versions Packages Information History CVEs Related Badges Report

Packages for bind

681 package(s) known

bind

9.16.8 Potentially vulnerable (9.16.8-r1)

bind

9.16.8 Potentially vulnerable (9.16.8-r0)

bind

9.14.12 Potentially vulnerable (9.14.12-r0)

bind-dbg

9.16.8 Potentially vulnerable (9.16.8-r0)

bind-dbg

9.16.8 Potentially vulnerable (9.16.8-r1)

bind-dbg

9.14.12 Potentially vulnerable (9.14.12-r0)

bind-dev

9.16.8 Potentially vulnerable (9.16.8-r1)

bind-dev

9.16.8 Potentially vulnerable (9.16.8-r0)

bind-dev

9.14.12 Potentially vulnerable (9.14.12-r0)

bind-doc

9.16.8 Potentially vulnerable (9.16.8-r0)

bind-doc

9.16.8 Potentially vulnerable (9.16.8-r1)

bind-doc

9.14.12 Potentially vulnerable (9.14.12-r0)

bind-libs

9.16.8 Potentially vulnerable (9.16.8-r0)

bind-libs

9.16.8 Potentially vulnerable (9.16.8-r1)

bind-libs

9.14.12 Potentially vulnerable (9.14.12-r0)

bind-openrc

9.16.8 Potentially vulnerable (9.16.8-r0)

bind-openrc

9.16.8 Potentially vulnerable (9.16.8-r1)

bind-openrc

9.14.12 Potentially vulnerable (9.14.12-r0)

bind-tools

9.16.8 Potentially vulnerable (9.16.8-r0)

bind-tools

9.16.8 Potentially vulnerable (9.16.8-r1)

bind-tools

9.14.12 Potentially vulnerable (9.14.12-r0)

bind

9.14.5 Potentially vulnerable (9.14.5-2)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.14.5 Potentially vulnerable (9.14.5-1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.12.2 Potentially vulnerable (9.12.2-1.P1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.11.2 Potentially vulnerable (9.11.2-1.P1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.11.36 Potentially vulnerable (32:9.11.36-3.el8)
AlmaLinux 8
AppStream

bind9.16

9.16.23 Potentially vulnerable (32:9.16.23-0.7.el8)
AlmaLinux 9
AppStream

bind

9.16.23 Potentially vulnerable (32:9.16.23-1.el9)

bind

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind-dev

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind-dnssec-tools

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind-doc

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind-libs

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind-openrc

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind-tools

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

py3-bind

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind-dev

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind-dnssec-tools

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind-doc

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind-libs

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind-openrc

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind-tools

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

py3-bind

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind

9.16.15 Potentially vulnerable (9.16.15-r2)

bind-dev

9.16.15 Potentially vulnerable (9.16.15-r2)

bind-dnssec-root

9.16.15 Potentially vulnerable (9.16.15-r2)

bind-dnssec-tools

9.16.15 Potentially vulnerable (9.16.15-r2)

bind-doc

9.16.15 Potentially vulnerable (9.16.15-r2)

bind-libs

9.16.15 Potentially vulnerable (9.16.15-r2)

bind-openrc

9.16.15 Potentially vulnerable (9.16.15-r2)

bind-plugins

9.16.15 Potentially vulnerable (9.16.15-r2)

bind-tools

9.16.15 Potentially vulnerable (9.16.15-r2)

py3-bind

9.16.15 Potentially vulnerable (9.16.15-r2)

bind

9.16.20 Potentially vulnerable (9.16.20-r1)

bind-dev

9.16.20 Potentially vulnerable (9.16.20-r1)

bind-dnssec-root

9.16.20 Potentially vulnerable (9.16.20-r1)

bind-dnssec-tools

9.16.20 Potentially vulnerable (9.16.20-r1)

bind-doc

9.16.20 Potentially vulnerable (9.16.20-r1)

bind-libs

9.16.20 Potentially vulnerable (9.16.20-r1)

bind-openrc

9.16.20 Potentially vulnerable (9.16.20-r1)

bind-plugins

9.16.20 Potentially vulnerable (9.16.20-r1)

bind-tools

9.16.20 Potentially vulnerable (9.16.20-r1)

py3-bind

9.16.20 Potentially vulnerable (9.16.20-r1)

bind

9.16.27 Potentially vulnerable (9.16.27-r1)

bind-dev

9.16.27 Potentially vulnerable (9.16.27-r1)

bind-dnssec-root

9.16.27 Potentially vulnerable (9.16.27-r1)

bind-dnssec-tools

9.16.27 Potentially vulnerable (9.16.27-r1)

bind-doc

9.16.27 Potentially vulnerable (9.16.27-r1)

bind-libs

9.16.27 Potentially vulnerable (9.16.27-r1)

bind-openrc

9.16.27 Potentially vulnerable (9.16.27-r1)

bind-plugins

9.16.27 Potentially vulnerable (9.16.27-r1)

bind-tools

9.16.27 Potentially vulnerable (9.16.27-r1)

py3-bind

9.16.27 Potentially vulnerable (9.16.27-r1)

bind

9.16.33 (9.16.33-r0)

bind-dev

9.16.33 (9.16.33-r0)

bind-dnssec-root

9.16.33 (9.16.33-r0)

bind-dnssec-tools

9.16.33 (9.16.33-r0)

bind-doc

9.16.33 (9.16.33-r0)

bind-libs

9.16.33 (9.16.33-r0)

bind-openrc

9.16.33 (9.16.33-r0)

bind-plugins

9.16.33 (9.16.33-r0)

bind-tools

9.16.33 (9.16.33-r0)

py3-bind

9.16.33 (9.16.33-r0)

bind

9.16.33 (9.16.33-r0)

bind-dev

9.16.33 (9.16.33-r0)

bind-dnssec-root

9.16.33 (9.16.33-r0)

bind-dnssec-tools

9.16.33 (9.16.33-r0)

bind-doc

9.16.33 (9.16.33-r0)

bind-libs

9.16.33 (9.16.33-r0)

bind-openrc

9.16.33 (9.16.33-r0)

bind-plugins

9.16.33 (9.16.33-r0)

bind-tools

9.16.33 (9.16.33-r0)

py3-bind

9.16.33 (9.16.33-r0)

bind

9.16.33 (9.16.33-r0)

bind-dbg

9.16.33 (9.16.33-r0)

bind-dev

9.16.33 (9.16.33-r0)

bind-dnssec-root

9.16.33 (9.16.33-r0)

bind-dnssec-tools

9.16.33 (9.16.33-r0)

bind-doc

9.16.33 (9.16.33-r0)

bind-libs

9.16.33 (9.16.33-r0)

bind-openrc

9.16.33 (9.16.33-r0)

bind-plugins

9.16.33 (9.16.33-r0)

bind-tools

9.16.33 (9.16.33-r0)

py3-bind

9.16.33 (9.16.33-r0)

bind

9.16.33 (9.16.33-r0)

bind-dbg

9.16.33 (9.16.33-r0)

bind-dev

9.16.33 (9.16.33-r0)

bind-dnssec-root

9.16.33 (9.16.33-r0)

bind-dnssec-tools

9.16.33 (9.16.33-r0)

bind-doc

9.16.33 (9.16.33-r0)

bind-libs

9.16.33 (9.16.33-r0)

bind-openrc

9.16.33 (9.16.33-r0)

bind-plugins

9.16.33 (9.16.33-r0)

bind-tools

9.16.33 (9.16.33-r0)

py3-bind

9.16.33 (9.16.33-r0)

bind

9.18.7 (9.18.7-r0)

bind-dbg

9.18.7 (9.18.7-r0)

bind-dev

9.18.7 (9.18.7-r0)

bind-dnssec-root

9.18.7 (9.18.7-r0)

bind-dnssec-tools

9.18.7 (9.18.7-r0)

bind-doc

9.18.7 (9.18.7-r0)

bind-libs

9.18.7 (9.18.7-r0)

bind-openrc

9.18.7 (9.18.7-r0)

bind-plugins

9.18.7 (9.18.7-r0)

bind-tools

9.18.7 (9.18.7-r0)

bind

9.11.37 Potentially vulnerable (9.11.37-alt1)

bind

9.11.37 Potentially vulnerable (9.11.37-alt1)

bind

9.11.37 Potentially vulnerable (9.11.37-alt1)

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.87.amzn1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.86.amzn1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.62.rc1.57.amzn1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.64.amzn1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.58.amzn1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.59.amzn1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.85.amzn1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.60.amzn1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.amzn2.2)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Links(s):

bind

9.11.4 Potentially vulnerable (32:9.11.4-9.P2.amzn2.0.4)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Links(s):

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.amzn2.5.2)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Links(s):

bind

9.11.4 Potentially vulnerable (32:9.11.4-9.P2.amzn2.0.2)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Links(s):

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.amzn2.5)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Links(s):

bind

9.11.4 Potentially vulnerable (32:9.11.4-9.P2.amzn2.0.3)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Links(s):

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.amzn2.4)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-51.amzn2.2)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-61.amzn2.1.1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-73.amzn2.1.1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-51.amzn2)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-61.amzn2.0.1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-74.amzn2.1.2)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-61.amzn2.0.2)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-73.amzn2.1.2)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.16.21 Potentially vulnerable (1:9.16.21-1)
Apertis v2020
v2020/target

bind9

9.11.5.P4 Potentially vulnerable (1:9.11.5.P4+dfsg-5.1+deb10u5co1)
Apertis v2021
v2021/target

bind9

9.11.5.P4 Potentially vulnerable (1:9.11.5.P4+dfsg-5.1+deb10u7+apertis1)
Apertis v2022
v2022/target

bind9

9.16.27 Potentially vulnerable (1:9.16.27-1~deb11u1+apertis1)
Apertis v2023 Development
v2023dev1/target

bind9

9.16.22 Potentially vulnerable (1:9.16.22-1~deb11u1+apertis1)
Arch
extra

bind

9.18.7 (9.18.7-1)

bind

9.18.6 Potentially vulnerable (9.18.6-1.0)

bind-tools

9.16.5 Potentially vulnerable (9.16.5-1.0)

bind

9.18.6 Potentially vulnerable (9.18.6-1.0)

bind-tools

9.16.5 Potentially vulnerable (9.16.5-1.0)

bind

9.18.6 Potentially vulnerable (9.18.6-1.0)

bind-tools

9.16.5 Potentially vulnerable (9.16.5-1.0)

bind

9.18.7 (9.18.7-1)

bind

9.18.7 (9.18.7-1)

bind

9.18.6 Potentially vulnerable (9.18.6-1)
  • Summary:
    A complete, highly portable implementation of the DNS protocol
  • License:
    • MPL2
  • Links(s):

bind

9.18.6 Potentially vulnerable (9.18.6-1)
  • Summary:
    A complete, highly portable implementation of the DNS protocol
  • License:
    • MPL2
  • Links(s):

bind

9.18.6 Potentially vulnerable (9.18.6-1)
  • Summary:
    A complete, highly portable implementation of the DNS protocol
  • License:
    • MPL2
  • Links(s):

bind-git

9.main.r35397.84878f18d2 (9.main.r35397.84878f18d2-3)

bind-rl

9.16.25 Potentially vulnerable (9.16.25-1)

bind-rl-tools

9.16.25 Potentially vulnerable (9.16.25-1)
Artix
world

bind

9.18.6 Potentially vulnerable (9.18.6-1)
  • Summary:
    A complete, highly portable implementation of the DNS protocol
  • License:
    • MPL2
  • Links(s):

bind9

9.11.3 Potentially vulnerable (1:9.11.3+dfsg-1ubuntu1.15+ci202105041610+astra1)

bind

999.9.16.31

bind

9.18.7 (9.18.7-1)

net-dns/bind

9.16.22 Potentially vulnerable (9.16.22-r9)

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.el6)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):
CentOS 6
updates

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.el6_10.1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):
CentOS 6
updates

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.el6_10.3)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):
CentOS 6
updates

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.el6_10.7)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):
CentOS 6
updates

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.el6_10.8)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.el7)
CentOS 7
updates

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.el7_9.2)
CentOS 7
updates

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.el7_9.3)
CentOS 7
updates

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.el7_9.4)
CentOS 7
updates

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.el7_9.5)
CentOS 7
updates

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.el7_9.7)
CentOS 7
updates

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.el7_9.8)
CentOS 7
updates

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.el7_9.9)
CentOS 8
BaseOS

bind

9.11.26 Potentially vulnerable (32:9.11.26-6.el8)

bind

9.11.36 Potentially vulnerable (32:9.11.36-2.el8)

bind

9.11.36 Potentially vulnerable (32:9.11.36-3.el8)

bind

9.11.36 Potentially vulnerable (32:9.11.36-4.el8)

bind

9.11.26 Potentially vulnerable (32:9.11.26-3.el8)

bind

9.11.26 Potentially vulnerable (32:9.11.26-4.el8_4)

bind

9.11.26 Potentially vulnerable (32:9.11.26-6.el8)
CentOS Stream 8
AppStream

bind9.16

9.16.23 Potentially vulnerable (32:9.16.23-0.5.el8)
CentOS Stream 8
AppStream

bind9.16

9.16.23 Potentially vulnerable (32:9.16.23-0.7.el8)
CentOS Stream 8
AppStream

bind9.16

9.16.23 Potentially vulnerable (32:9.16.23-0.9.el8)
CentOS Stream 9
AppStream

bind

9.16.23 Potentially vulnerable (32:9.16.23-1.el9)
CentOS Stream 9
AppStream

bind

9.16.23 Potentially vulnerable (32:9.16.23-3.el9)
CentOS Stream 9
AppStream

bind

9.16.23 Potentially vulnerable (32:9.16.23-4.el9)
CentOS Stream 9
AppStream

bind

9.16.20 Potentially vulnerable (32:9.16.20-2.el9)

BIND Tools

9.16.28 Potentially vulnerable
CRUX 3.4
contrib

bind

9.14.2 Potentially vulnerable

bindutils

9.12.4 Potentially vulnerable
CRUX 3.5
contrib

bind

9.16.9 Potentially vulnerable

bindutils

9.14.12 Potentially vulnerable

bind

9.11.9 Potentially vulnerable (9.11.9-1)

bind-debuginfo

9.11.9 Potentially vulnerable (9.11.9-1)

bind-doc

9.11.9 Potentially vulnerable (9.11.9-1)

bind-utils

9.11.9 Potentially vulnerable (9.11.9-1)

libbind9-devel

9.11.9 Potentially vulnerable (9.11.9-1)

libbind9_160

9.11.9 Potentially vulnerable (9.11.9-1)

libbind9_161

9.11.9 Potentially vulnerable (9.11.9-1)

libdns1104

9.11.9 Potentially vulnerable (9.11.9-1)

libdns1105

9.11.9 Potentially vulnerable (9.11.9-1)

libdns1106

9.11.9 Potentially vulnerable (9.11.9-1)

libdns166

9.11.9 Potentially vulnerable (9.11.9-1)

libdns169

9.11.9 Potentially vulnerable (9.11.9-1)

libirs160

9.11.9 Potentially vulnerable (9.11.9-1)

libirs161

9.11.9 Potentially vulnerable (9.11.9-1)

libisc1100

9.11.9 Potentially vulnerable (9.11.9-1)

libisc160

9.11.9 Potentially vulnerable (9.11.9-1)

libisc166

9.11.9 Potentially vulnerable (9.11.9-1)

libisccc160

9.11.9 Potentially vulnerable (9.11.9-1)

libisccc161

9.11.9 Potentially vulnerable (9.11.9-1)

libisccfg160

9.11.9 Potentially vulnerable (9.11.9-1)

libisccfg163

9.11.9 Potentially vulnerable (9.11.9-1)

liblwres160

9.11.9 Potentially vulnerable (9.11.9-1)

liblwres161

9.11.9 Potentially vulnerable (9.11.9-1)

python27-isc

9.11.9 Potentially vulnerable (9.11.9-1)

python36-isc

9.11.9 Potentially vulnerable (9.11.9-1)

python37-isc

9.11.9 Potentially vulnerable (9.11.9-1)
Debian 8
jessie/updates/main

bind9

9.9.5.dfsg Potentially vulnerable (1:9.9.5.dfsg-9+deb8u19)
Debian 8
jessie/main

bind9

9.9.5.dfsg Potentially vulnerable (1:9.9.5.dfsg-9+deb8u15)
Devuan 1.0
jessie/main

bind9

9.9.5.dfsg Potentially vulnerable (1:9.9.5.dfsg-9+deb8u15)
Devuan 2.0
ascii/main

bind9

9.10.3.dfsg.P4 Potentially vulnerable (1:9.10.3.dfsg.P4-12.3+deb9u6)
Devuan 3.0
beowulf/main

bind9

9.11.5.P4 Potentially vulnerable (1:9.11.5.P4+dfsg-5.1+deb10u7)
Devuan 4.0
chimaera/main

bind9

9.16.27 Potentially vulnerable (1:9.16.27-1~deb11u1)
Devuan Unstable
unstable/main

bind9

9.18.7 (1:9.18.7-1)

bind

9.18.7

dns/bind-tools

9.18.5 Potentially vulnerable

dns/bind9-devel

9.17.22.a0.2022.03.25 Potentially vulnerable (9.17.22.a0.2022.03.25_1)

dns/bind916

9.16.31 Potentially vulnerable

dns/bind918

9.18.5 Potentially vulnerable

dns/samba-nsupdate

9.16.5 Potentially vulnerable
Entware
armv7sf-k2.6

bind-check

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
x64-k3.2

bind-check

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
aarch64-k3.10

bind-check

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
armv5sf-k3.2

bind-check

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
armv7sf-k3.2

bind-check

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
mipselsf-k3.4

bind-check

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
mipssf-k3.4

bind-check

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
x64-k3.2

bind-client

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
armv7sf-k2.6

bind-client

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
aarch64-k3.10

bind-client

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
armv5sf-k3.2

bind-client

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
armv7sf-k3.2

bind-client

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
mipselsf-k3.4

bind-client

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
mipssf-k3.4

bind-client

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
x64-k3.2

bind-ddns-confgen

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
aarch64-k3.10

bind-ddns-confgen

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
armv5sf-k3.2

bind-ddns-confgen

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
armv7sf-k3.2

bind-ddns-confgen

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
mipselsf-k3.4

bind-ddns-confgen

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
mipssf-k3.4

bind-ddns-confgen

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
armv7sf-k2.6

bind-ddns-confgen

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
x64-k3.2

bind-dig

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
aarch64-k3.10

bind-dig

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
armv5sf-k3.2

bind-dig

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
armv7sf-k3.2

bind-dig

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
mipselsf-k3.4

bind-dig

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
mipssf-k3.4

bind-dig

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
armv7sf-k2.6

bind-dig

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
armv7sf-k2.6

bind-dnssec

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
aarch64-k3.10

bind-dnssec

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
armv5sf-k3.2

bind-dnssec

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
armv7sf-k3.2

bind-dnssec

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
mipselsf-k3.4

bind-dnssec

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
mipssf-k3.4

bind-dnssec

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
x64-k3.2

bind-dnssec

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
armv7sf-k2.6

bind-host

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
aarch64-k3.10

bind-host

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
armv5sf-k3.2

bind-host

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
armv7sf-k3.2

bind-host

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
mipselsf-k3.4

bind-host

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
mipssf-k3.4

bind-host

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
x64-k3.2

bind-host

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
armv7sf-k2.6

bind-libs

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
aarch64-k3.10

bind-libs

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
armv5sf-k3.2

bind-libs

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
armv7sf-k3.2

bind-libs

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
mipselsf-k3.4

bind-libs

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
mipssf-k3.4

bind-libs

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
x64-k3.2

bind-libs

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
armv7sf-k2.6

bind-nslookup

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
mipssf-k3.4

bind-nslookup

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
aarch64-k3.10

bind-nslookup

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
armv5sf-k3.2

bind-nslookup

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
armv7sf-k3.2

bind-nslookup

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
mipselsf-k3.4

bind-nslookup

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
x64-k3.2

bind-nslookup

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
armv7sf-k2.6

bind-rndc

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
mipssf-k3.4

bind-rndc

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
aarch64-k3.10

bind-rndc

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
armv5sf-k3.2

bind-rndc

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
armv7sf-k3.2

bind-rndc

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
mipselsf-k3.4

bind-rndc

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
x64-k3.2

bind-rndc

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
armv7sf-k2.6

bind-server

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
mipssf-k3.4

bind-server

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
armv5sf-k3.2

bind-server

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
aarch64-k3.10

bind-server

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
armv7sf-k3.2

bind-server

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
mipselsf-k3.4

bind-server

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
x64-k3.2

bind-server

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
armv7sf-k2.6

bind-server-filter-aaaa

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
armv5sf-k3.2

bind-server-filter-aaaa

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
aarch64-k3.10

bind-server-filter-aaaa

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
armv7sf-k3.2

bind-server-filter-aaaa

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
mipselsf-k3.4

bind-server-filter-aaaa

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
x64-k3.2

bind-server-filter-aaaa

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
mipssf-k3.4

bind-server-filter-aaaa

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
armv7sf-k2.6

bind-tools

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
x64-k3.2

bind-tools

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
armv5sf-k3.2

bind-tools

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
aarch64-k3.10

bind-tools

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
armv7sf-k3.2

bind-tools

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
mipselsf-k3.4

bind-tools

9.18.4 Potentially vulnerable (9.18.4-1)
Entware
mipssf-k3.4

bind-tools

9.18.4 Potentially vulnerable (9.18.4-1)

bind

9.11.26 Potentially vulnerable (32:9.11.26-4.el8_4)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Links(s):

bind

9.11.26 Potentially vulnerable (32:9.11.26-6.el8)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Links(s):

bind

9.11.20 Potentially vulnerable (32:9.11.20-5.el8)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Links(s):

bind

9.11.20 Potentially vulnerable (32:9.11.20-5.el8_3.1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Links(s):
Exherbo
arbor

net-dns/bind

9.16.33
Exherbo
arbor

net-dns/bind-tools

9.16.33
Fedora 26
updates

bind

9.11.2 Potentially vulnerable (32:9.11.2-1.P1.fc26)
Fedora 26
release

bind

9.11.1 Potentially vulnerable (32:9.11.1-1.P1.fc26)
Fedora 26
updates

bind99

9.9.10 Potentially vulnerable (9.9.10-3.P3.fc26)
Fedora 26
release

bind99

9.9.9 Potentially vulnerable (9.9.9-5.P8.fc26)
Fedora 27
updates

bind

9.11.4 Potentially vulnerable (32:9.11.4-3.P2.fc27)
Fedora 27
release

bind

9.11.1 Potentially vulnerable (32:9.11.1-7.P3.fc27)
Fedora 27
release

bind99

9.9.11 Potentially vulnerable (9.9.11-2.fc27)
Fedora 27
updates

bind99

9.9.11 Potentially vulnerable (9.9.11-3.fc27)
Fedora 28
updates

bind

9.11.4 Potentially vulnerable (32:9.11.4-13.P2.fc28)
Fedora 28
release

bind

9.11.3 Potentially vulnerable (32:9.11.3-6.fc28)
Fedora 28
release

bind99

9.9.11 Potentially vulnerable (9.9.11-4.fc28)
Fedora 29
updates

bind

9.11.10 Potentially vulnerable (32:9.11.10-1.fc29)
Fedora 29
release

bind

9.11.4 Potentially vulnerable (32:9.11.4-10.P2.fc29)
Fedora 30
updates

bind

9.11.14 Potentially vulnerable (32:9.11.14-2.fc30)
Fedora 30
release

bind

9.11.5 Potentially vulnerable (32:9.11.5-13.P4.fc30)
Fedora 31
updates

bind

9.11.22 Potentially vulnerable (32:9.11.22-1.fc31)
Fedora 31
release

bind

9.11.11 Potentially vulnerable (32:9.11.11-1.fc31)
Fedora 32
updates

bind

9.11.28 Potentially vulnerable (32:9.11.28-1.fc32)
Fedora 32
release

bind

9.11.17 Potentially vulnerable (32:9.11.17-1.fc32)
Fedora 33
updates

bind

9.11.36 Potentially vulnerable (32:9.11.36-1.fc33)
Fedora 33
release

bind

9.11.23 Potentially vulnerable (32:9.11.23-1.fc33)
Fedora 34
updates

bind

9.16.27 Potentially vulnerable (32:9.16.27-1.fc34)
Fedora 34
release

bind

9.16.11 Potentially vulnerable (32:9.16.11-5.fc34)
Fedora 35
updates

bind

9.16.33 (32:9.16.33-1.fc35)
Fedora 35
release

bind

9.16.21 Potentially vulnerable (32:9.16.21-1.fc35)
Fedora 36
updates

bind

9.16.33 (32:9.16.33-1.fc36)
Fedora 36
release

bind

9.16.27 Potentially vulnerable (32:9.16.27-1.fc36)
Fedora 37
development

bind

9.18.7 (32:9.18.7-1.fc37)
Fedora Rawhide
development

bind

9.18.7 (32:9.18.7-3.fc38)

dns/bind-tools

9.18.7

dns/bind9-devel

9.19.3.2022.06.16 Potentially vulnerable (9.19.3.2022.06.16_1)

dns/bind916

9.16.33 (9.16.33_1)

dns/bind918

9.18.7 (9.18.7_1)

dns/samba-nsupdate

9.16.5 Potentially vulnerable
Funtoo 1.4
net-kit

net-dns/bind

9.18.7
Funtoo 1.4
net-kit

net-dns/bind-tools

9.18.7

net-dns/bind

9.16.33

net-dns/bind

9.16.32 Potentially vulnerable

net-dns/bind

9.16.31 Potentially vulnerable

net-dns/bind

9.16.30 Potentially vulnerable

net-dns/bind

9.16.29 Potentially vulnerable (9.16.29-r1)

net-dns/bind

9.16.29 Potentially vulnerable

net-dns/bind

9.16.27 Potentially vulnerable (9.16.27-r1)

net-dns/bind-tools

9.16.33

net-dns/bind-tools

9.16.32 Potentially vulnerable

net-dns/bind-tools

9.16.31 Potentially vulnerable

net-dns/bind-tools

9.16.30 Potentially vulnerable

net-dns/bind-tools

9.16.29 Potentially vulnerable (9.16.29-r1)

net-dns/bind-tools

9.16.27 Potentially vulnerable

bind

9.16.26 Potentially vulnerable

Bind

9.11.1 Potentially vulnerable

bind

9.18.7
HP-UX 11.31
hppa_32

dig

2.0 Potentially vulnerable
HP-UX 11.31
ia64_32

dig

2.0 Potentially vulnerable

bind9

9.18.7 (1:9.18.7-1)
KaOS
core

dnsutils

9.18.7 (9.18.7-1)

net-dns/bind

9.19.4 Potentially vulnerable

net-dns/bind

9.19.3 Potentially vulnerable

net-dns/bind

9.18.6 Potentially vulnerable

net-dns/bind

9.18.5 Potentially vulnerable

net-dns/bind-tools

9.19.4 Potentially vulnerable

net-dns/bind-tools

9.19.3 Potentially vulnerable

net-dns/bind-tools

9.18.5 Potentially vulnerable

net-dns/bind-tools

9.18.4 Potentially vulnerable

net-dns/bind

9.19.4 Potentially vulnerable

net-dns/bind

9.19.3 Potentially vulnerable

net-dns/bind

9.18.7

net-dns/bind

9.18.6 Potentially vulnerable

net-dns/bind-tools

9.19.4 Potentially vulnerable

net-dns/bind-tools

9.19.3 Potentially vulnerable

net-dns/bind-tools

9.18.5 Potentially vulnerable

net-dns/bind-tools

9.18.4 Potentially vulnerable

bind9

9.18.7
Mageia 7
core/release

bind

9.11.6 Potentially vulnerable (9.11.6-1.mga7)
Mageia 7
core/updates

bind

9.11.6 Potentially vulnerable (9.11.6-1.1.mga7)
Mageia 7
core/updates

bind

9.11.6 Potentially vulnerable (9.11.6-1.2.mga7)
Mageia 7
core/updates

bind

9.11.6 Potentially vulnerable (9.11.6-1.3.mga7)
Mageia 7
core/updates

bind

9.11.6 Potentially vulnerable (9.11.6-1.4.mga7)
Mageia 7
core/updates

bind

9.11.6 Potentially vulnerable (9.11.6-1.5.mga7)
Mageia 8
core/updates

bind

9.11.37 Potentially vulnerable (9.11.37-1.mga8)
  • Summary:
    A DNS (Domain Name System) server
  • Category:
    • System/Servers
  • License:
    • MPLv2.0
  • Links(s):
Mageia 8
core/updates

bind

9.11.36 Potentially vulnerable (9.11.36-1.1.mga8)
  • Summary:
    A DNS (Domain Name System) server
  • Category:
    • System/Servers
  • License:
    • MPLv2.0
  • Links(s):
Mageia 8
core/updates

bind

9.11.31 Potentially vulnerable (9.11.31-1.1.mga8)
  • Summary:
    A DNS (Domain Name System) server
  • Category:
    • System/Servers
  • License:
    • MPLv2.0
  • Links(s):
Mageia 8
core/release

bind

9.11.27 Potentially vulnerable (9.11.27-1.mga8)
  • Summary:
    A DNS (Domain Name System) server
  • Category:
    • System/Servers
  • License:
    • MPLv2.0
  • Links(s):
Mageia 8
core/updates

bind

9.11.27 Potentially vulnerable (9.11.27-1.1.mga8)
  • Summary:
    A DNS (Domain Name System) server
  • Category:
    • System/Servers
  • License:
    • MPLv2.0
  • Links(s):
Mageia Cauldron
core/release

bind

9.18.7 (9.18.7-1.mga9)

bind

9.18.6 Potentially vulnerable (9.18.6-1)
  • Summary:
    A complete, highly portable implementation of the DNS protocol
  • License:
    • MPL2
  • Links(s):

bind

9.18.7 (9.18.7-1)
  • Summary:
    A complete, highly portable implementation of the DNS protocol
  • License:
    • MPL2
  • Links(s):

bind

9.18.7 (9.18.7-1)
  • Summary:
    A complete, highly portable implementation of the DNS protocol
  • License:
    • MPL2
  • Links(s):

dns/bind-tools

9.18.3 Potentially vulnerable (9.18.3_1)

dns/bind916

9.16.29 Potentially vulnerable (9.16.29_2)

dns/bind918

9.18.3 Potentially vulnerable (9.18.3_1)

dns/samba-nsupdate

9.16.5 Potentially vulnerable

bind

9.16.16 Potentially vulnerable

bind

9.16.16 Potentially vulnerable

bind

9.16.16 Potentially vulnerable

bind

9.16.27 Potentially vulnerable

bind

9.16.27 Potentially vulnerable

bind

9.16.27 Potentially vulnerable

bind

9.18.7

bind

9.18.7

bind

9.18.7

bind

9.18.7

bind

9.18.7

bind

9.18.7

bind

9.11.4 Potentially vulnerable (32:9.11.4-13.oe1)

bind

9.16.23 Potentially vulnerable (32:9.16.23-6.oe2203)

bind

9.16.33

bind

9.16.33

bind

9.16.29 Potentially vulnerable

bind

9.16.29 Potentially vulnerable
openmamba
devel

bind

9.18.7 (9.18.7-1mamba)
OpenMandriva 4.0
main/release

bind

9.15.0 Potentially vulnerable (1:9.15.0-1)
OpenMandriva 4.0
main/release

bind

9.14.1 Potentially vulnerable (1:9.14.1-1)
OpenMandriva 4.1
main/release

bind

9.15.8 Potentially vulnerable (1:9.15.8-1)
OpenMandriva 4.2
main/updates

bind

9.17.6 Potentially vulnerable (1:9.17.6-1)
OpenMandriva 4.2
main/release

bind

9.15.8 Potentially vulnerable (1:9.15.8-2)

bind

9.18.4 Potentially vulnerable (1:9.18.4-1)
OpenMandriva Cooker
main/release

bind

9.18.4 Potentially vulnerable (1:9.18.4-1)

bind

9.18.7
openSUSE Leap 42.3
updates/oss

bind

9.9.9P1 Potentially vulnerable (9.9.9P1-53.1)

bind

9.9.9P1 Potentially vulnerable (9.9.9P1-51.1)

bind

9.11.2 Potentially vulnerable (9.11.2-lp150.7.2)
openSUSE Leap 15.0
updates/oss

bind

9.11.2 Potentially vulnerable (9.11.2-lp150.8.13.1)
openSUSE Leap 15.0
updates/oss

bind

9.11.2 Potentially vulnerable (9.11.2-lp150.8.16.1)
openSUSE Leap 15.0
updates/oss

bind

9.11.2 Potentially vulnerable (9.11.2-lp150.8.3.1)
openSUSE Leap 15.0
updates/oss

bind

9.11.2 Potentially vulnerable (9.11.2-lp150.8.6.1)
openSUSE Leap 15.0
updates/oss

bind

9.11.2 Potentially vulnerable (9.11.2-lp150.8.9.1)
openSUSE Leap 15.1
updates/oss

bind

9.16.6 Potentially vulnerable (9.16.6-lp151.11.12.1)
openSUSE Leap 15.1
updates/oss

bind

9.16.6 Potentially vulnerable (9.16.6-lp151.11.15.1)
openSUSE Leap 15.1
updates/oss

bind

9.16.6 Potentially vulnerable (9.16.6-lp151.11.9.1)

bind

9.11.2 Potentially vulnerable (9.11.2-lp151.10.1)
openSUSE Leap 15.1
updates/oss

bind

9.11.2 Potentially vulnerable (9.11.2-lp151.11.3.1)
openSUSE Leap 15.1
updates/oss

bind

9.11.2 Potentially vulnerable (9.11.2-lp151.11.6.1)
openSUSE Leap 15.2
updates/oss

bind

9.16.6 Potentially vulnerable (9.16.6-lp152.14.12.1)
openSUSE Leap 15.2
updates/oss

bind

9.16.6 Potentially vulnerable (9.16.6-lp152.14.13.1)
openSUSE Leap 15.2
updates/oss

bind

9.16.6 Potentially vulnerable (9.16.6-lp152.14.19.1)
openSUSE Leap 15.2
updates/oss

bind

9.16.6 Potentially vulnerable (9.16.6-lp152.14.22.1)
openSUSE Leap 15.2
updates/oss

bind

9.16.6 Potentially vulnerable (9.16.6-lp152.14.25.1)
openSUSE Leap 15.2
updates/oss

bind

9.16.6 Potentially vulnerable (9.16.6-lp152.14.3.1)
openSUSE Leap 15.2
updates/oss

bind

9.16.6 Potentially vulnerable (9.16.6-lp152.14.6.1)
openSUSE Leap 15.2
updates/oss

bind

9.16.6 Potentially vulnerable (9.16.6-lp152.14.9.1)

bind

9.11.2 Potentially vulnerable (9.11.2-lp152.13.6)

bind

9.16.6 Potentially vulnerable (9.16.6-20.39)

bind

9.16.20 Potentially vulnerable (9.16.20-150400.3.6)

bind

9.18.7 (9.18.7-1.1)

bind

9.18.7 (9.18.7-413.3)

bind-check

9.10.4-P5 Potentially vulnerable (9.10.4-P5-1)

bind-client

9.10.4-P5 Potentially vulnerable (9.10.4-P5-1)

bind-dig

9.10.4-P5 Potentially vulnerable (9.10.4-P5-1)

bind-dnssec

9.10.4-P5 Potentially vulnerable (9.10.4-P5-1)

bind-host

9.10.4-P5 Potentially vulnerable (9.10.4-P5-1)

bind-libs

9.10.4-P5 Potentially vulnerable (9.10.4-P5-1)

bind-rndc

9.10.4-P5 Potentially vulnerable (9.10.4-P5-1)

bind-server

9.10.4-P5 Potentially vulnerable (9.10.4-P5-1)

bind-tools

9.10.4-P5 Potentially vulnerable (9.10.4-P5-1)

bind-check

9.11.19 Potentially vulnerable (9.11.19-1)

bind-client

9.11.19 Potentially vulnerable (9.11.19-1)

bind-dig

9.11.19 Potentially vulnerable (9.11.19-1)

bind-dnssec

9.11.19 Potentially vulnerable (9.11.19-1)

bind-host

9.11.19 Potentially vulnerable (9.11.19-1)

bind-libs

9.11.19 Potentially vulnerable (9.11.19-1)

bind-rndc

9.11.19 Potentially vulnerable (9.11.19-1)