Versions Packages Information History CVEs Related Badges Report

Packages for bind

577 package(s) known

bind

9.16.8 Potentially vulnerable (9.16.8-r1)

bind

9.16.8 Potentially vulnerable (9.16.8-r0)

bind

9.14.12 Potentially vulnerable (9.14.12-r0)

bind-dbg

9.16.8 Potentially vulnerable (9.16.8-r0)

bind-dbg

9.16.8 Potentially vulnerable (9.16.8-r1)

bind-dbg

9.14.12 Potentially vulnerable (9.14.12-r0)

bind-dev

9.16.8 Potentially vulnerable (9.16.8-r1)

bind-dev

9.16.8 Potentially vulnerable (9.16.8-r0)

bind-dev

9.14.12 Potentially vulnerable (9.14.12-r0)

bind-doc

9.16.8 Potentially vulnerable (9.16.8-r0)

bind-doc

9.16.8 Potentially vulnerable (9.16.8-r1)

bind-doc

9.14.12 Potentially vulnerable (9.14.12-r0)

bind-libs

9.16.8 Potentially vulnerable (9.16.8-r0)

bind-libs

9.16.8 Potentially vulnerable (9.16.8-r1)

bind-libs

9.14.12 Potentially vulnerable (9.14.12-r0)

bind-openrc

9.16.8 Potentially vulnerable (9.16.8-r0)

bind-openrc

9.16.8 Potentially vulnerable (9.16.8-r1)

bind-openrc

9.14.12 Potentially vulnerable (9.14.12-r0)

bind-tools

9.16.8 Potentially vulnerable (9.16.8-r0)

bind-tools

9.16.8 Potentially vulnerable (9.16.8-r1)

bind-tools

9.14.12 Potentially vulnerable (9.14.12-r0)

bind

9.14.5 Potentially vulnerable (9.14.5-1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.14.5 Potentially vulnerable (9.14.5-2)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.12.2 Potentially vulnerable (9.12.2-1.P1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.11.2 Potentially vulnerable (9.11.2-1.P1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.11.26 Potentially vulnerable (32:9.11.26-4.el8_4)

bind

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind-dev

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind-dnssec-tools

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind-doc

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind-libs

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind-openrc

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind-tools

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

py3-bind

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind-dev

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind-dnssec-tools

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind-doc

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind-libs

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind-openrc

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind-tools

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

py3-bind

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind

9.16.15 (9.16.15-r2)

bind-dev

9.16.15 (9.16.15-r2)

bind-dnssec-root

9.16.15 (9.16.15-r2)

bind-dnssec-tools

9.16.15 (9.16.15-r2)

bind-doc

9.16.15 (9.16.15-r2)

bind-libs

9.16.15 (9.16.15-r2)

bind-openrc

9.16.15 (9.16.15-r2)

bind-plugins

9.16.15 (9.16.15-r2)

bind-tools

9.16.15 (9.16.15-r2)

py3-bind

9.16.15 (9.16.15-r2)

bind

9.16.20 (9.16.20-r1)

bind-dev

9.16.20 (9.16.20-r1)

bind-dnssec-root

9.16.20 (9.16.20-r1)

bind-dnssec-tools

9.16.20 (9.16.20-r1)

bind-doc

9.16.20 (9.16.20-r1)

bind-libs

9.16.20 (9.16.20-r1)

bind-openrc

9.16.20 (9.16.20-r1)

bind-plugins

9.16.20 (9.16.20-r1)

bind-tools

9.16.20 (9.16.20-r1)

py3-bind

9.16.20 (9.16.20-r1)

bind

9.16.20 (9.16.20-r1)

bind-dev

9.16.20 (9.16.20-r1)

bind-dnssec-root

9.16.20 (9.16.20-r1)

bind-dnssec-tools

9.16.20 (9.16.20-r1)

bind-doc

9.16.20 (9.16.20-r1)

bind-libs

9.16.20 (9.16.20-r1)

bind-openrc

9.16.20 (9.16.20-r1)

bind-plugins

9.16.20 (9.16.20-r1)

bind-tools

9.16.20 (9.16.20-r1)

py3-bind

9.16.20 (9.16.20-r1)

bind

9.16.20 (9.16.20-r1)

bind-dev

9.16.20 (9.16.20-r1)

bind-dnssec-root

9.16.20 (9.16.20-r1)

bind-dnssec-tools

9.16.20 (9.16.20-r1)

bind-doc

9.16.20 (9.16.20-r1)

bind-libs

9.16.20 (9.16.20-r1)

bind-openrc

9.16.20 (9.16.20-r1)

bind-plugins

9.16.20 (9.16.20-r1)

bind-tools

9.16.20 (9.16.20-r1)

py3-bind

9.16.20 (9.16.20-r1)

bind

9.16.20 (9.16.20-r1)

bind-dev

9.16.20 (9.16.20-r1)

bind-dnssec-root

9.16.20 (9.16.20-r1)

bind-dnssec-tools

9.16.20 (9.16.20-r1)

bind-doc

9.16.20 (9.16.20-r1)

bind-libs

9.16.20 (9.16.20-r1)

bind-openrc

9.16.20 (9.16.20-r1)

bind-plugins

9.16.20 (9.16.20-r1)

bind-tools

9.16.20 (9.16.20-r1)

py3-bind

9.16.20 (9.16.20-r1)

bind

9.16.20 (9.16.20-r2)

bind-dbg

9.16.20 (9.16.20-r2)

bind-dev

9.16.20 (9.16.20-r2)

bind-dnssec-root

9.16.20 (9.16.20-r2)

bind-dnssec-tools

9.16.20 (9.16.20-r2)

bind-doc

9.16.20 (9.16.20-r2)

bind-libs

9.16.20 (9.16.20-r2)

bind-openrc

9.16.20 (9.16.20-r2)

bind-plugins

9.16.20 (9.16.20-r2)

bind-tools

9.16.20 (9.16.20-r2)

py3-bind

9.16.20 (9.16.20-r2)

bind

9.11.31 (9.11.31-alt1)

bind

9.11.32 (9.11.32-alt1)

bind

9.11.32 (9.11.32-alt1)

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.62.rc1.57.amzn1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.85.amzn1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.86.amzn1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.58.amzn1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.59.amzn1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.64.amzn1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.87.amzn1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.60.amzn1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.11.4 Potentially vulnerable (32:9.11.4-9.P2.amzn2.0.2)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Links(s):

bind

9.11.4 Potentially vulnerable (32:9.11.4-9.P2.amzn2.0.4)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Links(s):

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.amzn2.5.2)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Links(s):

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.amzn2.4)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Links(s):

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.amzn2.5)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Links(s):

bind

9.11.4 Potentially vulnerable (32:9.11.4-9.P2.amzn2.0.3)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Links(s):

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.amzn2.2)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-74.amzn2.1.2)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-73.amzn2.1.2)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-61.amzn2.1.1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-73.amzn2.1.1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-61.amzn2.0.2)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-51.amzn2.2)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-61.amzn2.0.1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-51.amzn2)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.16.12 Potentially vulnerable (1:9.16.12)
Apertis v2020
v2020/target

bind9

9.11.5.P4 Potentially vulnerable (1:9.11.5.P4+dfsg-5.1+deb10u5co1)
Apertis v2021
v2021/target

bind9

9.11.5.P4 Potentially vulnerable (1:9.11.5.P4+dfsg-5.1+deb10u5co1)
Apertis v2022 Development
v2022dev2/target

bind9

9.16.13 Potentially vulnerable (1:9.16.13-1apertis1)
Arch
extra

bind

9.16.21 (9.16.21-1)

bind-git

9.main.r34613.ba181fe83d (9.main.r34613.ba181fe83d-1)

bind-rl

9.16.3 Potentially vulnerable (9.16.3-1)

bind-rl-tools

9.16.3 Potentially vulnerable (9.16.3-1)
Artix
world

bind

9.16.21 (9.16.21-1)
  • Summary:
    A complete, highly portable implementation of the DNS protocol
  • License:
    • MPL2
  • Links(s):

bind9

9.11.3 Potentially vulnerable (1:9.11.3+dfsg-1ubuntu1.15+ci202105041610+astra1)

bind9

9.11.3 Potentially vulnerable (1:9.11.3+dfsg-1ubuntu1.15+ci202105041610+astra1)

bind

9.16.21 (9.16.21-1)

net-dns/bind

9.16.12 Potentially vulnerable (9.16.12-r1)

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.el6)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):
CentOS 6
updates

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.el6_10.1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):
CentOS 6
updates

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.el6_10.3)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):
CentOS 6
updates

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.el6_10.7)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):
CentOS 6
updates

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.el6_10.8)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.el7)
CentOS 7
updates

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.el7_9.2)
CentOS 7
updates

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.el7_9.3)
CentOS 7
updates

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.el7_9.4)
CentOS 7
updates

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.el7_9.5)
CentOS 7
updates

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.el7_9.7)
CentOS 8
BaseOS

bind

9.11.26 Potentially vulnerable (32:9.11.26-3.el8)
CentOS 8
BaseOS

bind

9.11.26 Potentially vulnerable (32:9.11.26-4.el8_4)

BIND Tools

9.14.2 Potentially vulnerable
CRUX 3.4
contrib

bind

9.14.2 Potentially vulnerable

bindutils

9.12.4 Potentially vulnerable
CRUX 3.5
contrib

bind

9.16.9 Potentially vulnerable

bindutils

9.14.12 Potentially vulnerable

bindutils

9.16.21

bind

9.11.9 Potentially vulnerable (9.11.9-1)

bind-debuginfo

9.11.9 Potentially vulnerable (9.11.9-1)

bind-doc

9.11.9 Potentially vulnerable (9.11.9-1)

bind-utils

9.11.9 Potentially vulnerable (9.11.9-1)

libbind9-devel

9.11.9 Potentially vulnerable (9.11.9-1)

libbind9_140

9.11.9 Potentially vulnerable (9.11.9-1)

libbind9_160

9.11.9 Potentially vulnerable (9.11.9-1)

libbind9_161

9.11.9 Potentially vulnerable (9.11.9-1)

libdns1104

9.11.9 Potentially vulnerable (9.11.9-1)

libdns1105

9.11.9 Potentially vulnerable (9.11.9-1)

libdns1106

9.11.9 Potentially vulnerable (9.11.9-1)

libdns165

9.11.9 Potentially vulnerable (9.11.9-1)

libdns166

9.11.9 Potentially vulnerable (9.11.9-1)

libdns169

9.11.9 Potentially vulnerable (9.11.9-1)

libirs141

9.11.9 Potentially vulnerable (9.11.9-1)

libirs160

9.11.9 Potentially vulnerable (9.11.9-1)

libirs161

9.11.9 Potentially vulnerable (9.11.9-1)

libisc1100

9.11.9 Potentially vulnerable (9.11.9-1)

libisc160

9.11.9 Potentially vulnerable (9.11.9-1)

libisc166

9.11.9 Potentially vulnerable (9.11.9-1)

libisccc140

9.11.9 Potentially vulnerable (9.11.9-1)

libisccc160

9.11.9 Potentially vulnerable (9.11.9-1)

libisccc161

9.11.9 Potentially vulnerable (9.11.9-1)

libisccfg140

9.11.9 Potentially vulnerable (9.11.9-1)

libisccfg160

9.11.9 Potentially vulnerable (9.11.9-1)

libisccfg163

9.11.9 Potentially vulnerable (9.11.9-1)

liblwres141

9.11.9 Potentially vulnerable (9.11.9-1)

liblwres160

9.11.9 Potentially vulnerable (9.11.9-1)

liblwres161

9.11.9 Potentially vulnerable (9.11.9-1)

python27-isc

9.11.9 Potentially vulnerable (9.11.9-1)

python36-isc

9.11.9 Potentially vulnerable (9.11.9-1)

python37-isc

9.11.9 Potentially vulnerable (9.11.9-1)
Debian 8
jessie/main

bind9

9.9.5 Potentially vulnerable (1:9.9.5.dfsg-9+deb8u15)

bind9

9.9.5 Potentially vulnerable (1:9.9.5.dfsg-9+deb8u15)
Devuan 4.0 (Chimaera)
chimaera/main

bind9

9.16.15 (1:9.16.15-1)
Devuan Unstable
unstable/main

bind9

9.16.15 (1:9.16.15-1)

bind

9.16.21

dns/bind-tools

9.16.20

dns/bind9-devel

9.17.15.a0.2021.06.28

dns/bind911

9.11.35

dns/bind916

9.16.20

dns/samba-nsupdate

9.16.5 Potentially vulnerable
Entware
aarch64-k3.10

bind-check

9.17.13 (9.17.13-1)
Entware
armv5sf-k3.2

bind-check

9.17.13 (9.17.13-1)
Entware
mipselsf-k3.4

bind-check

9.17.13 (9.17.13-1)
Entware
mipssf-k3.4

bind-check

9.17.13 (9.17.13-1)
Entware
x64-k3.2

bind-check

9.17.13 (9.17.13-1)
Entware
armv7sf-k2.6

bind-check

9.17.13 (9.17.13-1)
Entware
armv7sf-k3.2

bind-check

9.17.13 (9.17.13-1)
Entware
aarch64-k3.10

bind-client

9.17.13 (9.17.13-1)
Entware
armv5sf-k3.2

bind-client

9.17.13 (9.17.13-1)
Entware
mipselsf-k3.4

bind-client

9.17.13 (9.17.13-1)
Entware
mipssf-k3.4

bind-client

9.17.13 (9.17.13-1)
Entware
x64-k3.2

bind-client

9.17.13 (9.17.13-1)
Entware
armv7sf-k2.6

bind-client

9.17.13 (9.17.13-1)
Entware
armv7sf-k3.2

bind-client

9.17.13 (9.17.13-1)
Entware
aarch64-k3.10

bind-dig

9.17.13 (9.17.13-1)
Entware
armv5sf-k3.2

bind-dig

9.17.13 (9.17.13-1)
Entware
mipselsf-k3.4

bind-dig

9.17.13 (9.17.13-1)
Entware
mipssf-k3.4

bind-dig

9.17.13 (9.17.13-1)
Entware
x64-k3.2

bind-dig

9.17.13 (9.17.13-1)
Entware
armv7sf-k2.6

bind-dig

9.17.13 (9.17.13-1)
Entware
armv7sf-k3.2

bind-dig

9.17.13 (9.17.13-1)
Entware
aarch64-k3.10

bind-dnssec

9.17.13 (9.17.13-1)
Entware
mipselsf-k3.4

bind-dnssec

9.17.13 (9.17.13-1)
Entware
mipssf-k3.4

bind-dnssec

9.17.13 (9.17.13-1)
Entware
x64-k3.2

bind-dnssec

9.17.13 (9.17.13-1)
Entware
armv5sf-k3.2

bind-dnssec

9.17.13 (9.17.13-1)
Entware
armv7sf-k2.6

bind-dnssec

9.17.13 (9.17.13-1)
Entware
armv7sf-k3.2

bind-dnssec

9.17.13 (9.17.13-1)
Entware
x64-k3.2

bind-host

9.17.13 (9.17.13-1)
Entware
aarch64-k3.10

bind-host

9.17.13 (9.17.13-1)
Entware
mipselsf-k3.4

bind-host

9.17.13 (9.17.13-1)
Entware
mipssf-k3.4

bind-host

9.17.13 (9.17.13-1)
Entware
armv5sf-k3.2

bind-host

9.17.13 (9.17.13-1)
Entware
armv7sf-k2.6

bind-host

9.17.13 (9.17.13-1)
Entware
armv7sf-k3.2

bind-host

9.17.13 (9.17.13-1)
Entware
x64-k3.2

bind-libs

9.17.13 (9.17.13-1)
Entware
aarch64-k3.10

bind-libs

9.17.13 (9.17.13-1)
Entware
mipselsf-k3.4

bind-libs

9.17.13 (9.17.13-1)
Entware
mipssf-k3.4

bind-libs

9.17.13 (9.17.13-1)
Entware
armv5sf-k3.2

bind-libs

9.17.13 (9.17.13-1)
Entware
armv7sf-k2.6

bind-libs

9.17.13 (9.17.13-1)
Entware
armv7sf-k3.2

bind-libs

9.17.13 (9.17.13-1)
Entware
x64-k3.2

bind-nslookup

9.17.13 (9.17.13-1)
Entware
aarch64-k3.10

bind-nslookup

9.17.13 (9.17.13-1)
Entware
mipselsf-k3.4

bind-nslookup

9.17.13 (9.17.13-1)
Entware
mipssf-k3.4

bind-nslookup

9.17.13 (9.17.13-1)
Entware
armv5sf-k3.2

bind-nslookup

9.17.13 (9.17.13-1)
Entware
armv7sf-k2.6

bind-nslookup

9.17.13 (9.17.13-1)
Entware
armv7sf-k3.2

bind-nslookup

9.17.13 (9.17.13-1)
Entware
x64-k3.2

bind-rndc

9.17.13 (9.17.13-1)
Entware
aarch64-k3.10

bind-rndc

9.17.13 (9.17.13-1)
Entware
mipselsf-k3.4

bind-rndc

9.17.13 (9.17.13-1)
Entware
mipssf-k3.4

bind-rndc

9.17.13 (9.17.13-1)
Entware
armv5sf-k3.2

bind-rndc

9.17.13 (9.17.13-1)
Entware
armv7sf-k2.6

bind-rndc

9.17.13 (9.17.13-1)
Entware
armv7sf-k3.2

bind-rndc

9.17.13 (9.17.13-1)
Entware
x64-k3.2

bind-server

9.17.13 (9.17.13-1)
Entware
aarch64-k3.10

bind-server

9.17.13 (9.17.13-1)
Entware
mipselsf-k3.4

bind-server

9.17.13 (9.17.13-1)
Entware
mipssf-k3.4

bind-server

9.17.13 (9.17.13-1)
Entware
armv5sf-k3.2

bind-server

9.17.13 (9.17.13-1)
Entware
armv7sf-k2.6

bind-server

9.17.13 (9.17.13-1)
Entware
armv7sf-k3.2

bind-server

9.17.13 (9.17.13-1)
Entware
x64-k3.2

bind-server-filter-aaaa

9.17.13 (9.17.13-1)
Entware
aarch64-k3.10

bind-server-filter-aaaa

9.17.13 (9.17.13-1)
Entware
mipselsf-k3.4

bind-server-filter-aaaa

9.17.13 (9.17.13-1)
Entware
mipssf-k3.4

bind-server-filter-aaaa

9.17.13 (9.17.13-1)
Entware
armv5sf-k3.2

bind-server-filter-aaaa

9.17.13 (9.17.13-1)
Entware
armv7sf-k2.6

bind-server-filter-aaaa

9.17.13 (9.17.13-1)
Entware
armv7sf-k3.2

bind-server-filter-aaaa

9.17.13 (9.17.13-1)
Entware
x64-k3.2

bind-tools

9.17.13 (9.17.13-1)
Entware
aarch64-k3.10

bind-tools

9.17.13 (9.17.13-1)
Entware
mipselsf-k3.4

bind-tools

9.17.13 (9.17.13-1)
Entware
mipssf-k3.4

bind-tools

9.17.13 (9.17.13-1)
Entware
armv5sf-k3.2

bind-tools

9.17.13 (9.17.13-1)
Entware
armv7sf-k2.6

bind-tools

9.17.13 (9.17.13-1)
Entware
armv7sf-k3.2

bind-tools

9.17.13 (9.17.13-1)
Exherbo
arbor

net-dns/bind

9.16.21
Exherbo
arbor

net-dns/bind-tools

9.16.21
Fedora 26
updates

bind

9.11.2 Potentially vulnerable (32:9.11.2-1.P1.fc26)
Fedora 26
release

bind

9.11.1 Potentially vulnerable (32:9.11.1-1.P1.fc26)
Fedora 26
updates

bind99

9.9.10 Potentially vulnerable (9.9.10-3.P3.fc26)
Fedora 26
release

bind99

9.9.9 Potentially vulnerable (9.9.9-5.P8.fc26)
Fedora 27
updates

bind

9.11.4 Potentially vulnerable (32:9.11.4-3.P2.fc27)
Fedora 27
release

bind

9.11.1 Potentially vulnerable (32:9.11.1-7.P3.fc27)
Fedora 27
release

bind99

9.9.11 Potentially vulnerable (9.9.11-2.fc27)
Fedora 27
updates

bind99

9.9.11 Potentially vulnerable (9.9.11-3.fc27)
Fedora 28
updates

bind

9.11.4 Potentially vulnerable (32:9.11.4-13.P2.fc28)
Fedora 28
release

bind

9.11.3 Potentially vulnerable (32:9.11.3-6.fc28)
Fedora 28
release

bind99

9.9.11 Potentially vulnerable (9.9.11-4.fc28)
Fedora 29
updates

bind

9.11.10 Potentially vulnerable (32:9.11.10-1.fc29)
Fedora 29
release

bind

9.11.4 Potentially vulnerable (32:9.11.4-10.P2.fc29)
Fedora 30
updates

bind

9.11.14 Potentially vulnerable (32:9.11.14-2.fc30)
Fedora 30
release

bind

9.11.5 Potentially vulnerable (32:9.11.5-13.P4.fc30)
Fedora 31
updates

bind

9.11.22 Potentially vulnerable (32:9.11.22-1.fc31)
Fedora 31
release

bind

9.11.11 Potentially vulnerable (32:9.11.11-1.fc31)
Fedora 32
updates

bind

9.11.28 Potentially vulnerable (32:9.11.28-1.fc32)
Fedora 32
release

bind

9.11.17 Potentially vulnerable (32:9.11.17-1.fc32)
Fedora 33
updates

bind

9.11.35 (32:9.11.35-1.fc33)
Fedora 33
release

bind

9.11.23 Potentially vulnerable (32:9.11.23-1.fc33)
Fedora 34
updates

bind

9.16.21 (32:9.16.21-1.fc34)
Fedora 34
release

bind

9.16.11 Potentially vulnerable (32:9.16.11-5.fc34)

bind

9.16.21 (32:9.16.21-1.fc36)

dns/bind-tools

9.16.21

dns/bind9-devel

9.17.18.a0.2021.09.24

dns/bind911

9.11.35

dns/bind916

9.16.21

dns/samba-nsupdate

9.16.5 Potentially vulnerable
Funtoo 1.4
net-kit

net-dns/bind

9.16.21
Funtoo 1.4
core-kit

net-dns/bind-tools

9.12.3_p4 Potentially vulnerable

net-dns/bind

9.16.21

net-dns/bind

9.16.18

net-dns/bind

9.16.15 (9.16.15-r2)

net-dns/bind-tools

9.16.21

net-dns/bind-tools

9.16.18

net-dns/bind-tools

9.16.15

bind

9.16.16

Bind

9.11.1 Potentially vulnerable

bind

9.16.21
HP-UX 11.31
hppa_32

dig

2.0 Potentially vulnerable
HP-UX 11.31
ia64_32

dig

2.0 Potentially vulnerable
Hyperbola
extra

bind

9.11.5 Potentially vulnerable (9.11.5-1.hyperbola3)
Hyperbola
extra

bind-tools

9.11.5 Potentially vulnerable (9.11.5-1.hyperbola3)

bind9

9.16.15 (1:9.16.15-1)
KaOS
core

dnsutils

9.16.21 (9.16.21-1)

net-dns/bind

9.17.13

net-dns/bind

9.16.19 Potentially vulnerable

net-dns/bind-tools

9.16.16

net-dns/bind-tools

9.16.15

net-dns/bind

9.17.13

net-dns/bind

9.16.19 Potentially vulnerable

net-dns/bind-tools

9.16.16

net-dns/bind-tools

9.16.15

bind

9.16.21

bind9

9.16.21
Mageia 7
core/updates

bind

9.11.6 Potentially vulnerable (9.11.6-1.4.mga7)
Mageia 7
core/updates

bind

9.11.6 Potentially vulnerable (9.11.6-1.5.mga7)
Mageia 7
core/release

bind

9.11.6 Potentially vulnerable (9.11.6-1.mga7)
Mageia 7
core/updates

bind

9.11.6 Potentially vulnerable (9.11.6-1.1.mga7)
Mageia 7
core/updates

bind

9.11.6 Potentially vulnerable (9.11.6-1.2.mga7)
Mageia 7
core/updates

bind

9.11.6 Potentially vulnerable (9.11.6-1.3.mga7)
Mageia 8
core/updates

bind

9.11.31 (9.11.31-1.1.mga8)
  • Summary:
    A DNS (Domain Name System) server
  • Category:
    • System/Servers
  • License:
    • MPLv2.0
  • Links(s):
Mageia 8
core/updates

bind

9.11.27 Potentially vulnerable (9.11.27-1.1.mga8)
  • Summary:
    A DNS (Domain Name System) server
  • Category:
    • System/Servers
  • License:
    • MPLv2.0
  • Links(s):
Mageia 8
core/release

bind

9.11.27 Potentially vulnerable (9.11.27-1.mga8)
  • Summary:
    A DNS (Domain Name System) server
  • Category:
    • System/Servers
  • License:
    • MPLv2.0
  • Links(s):
Mageia Cauldron
core/release

bind

9.16.21 (9.16.21-1.mga9)

bind

9.16.21 (9.16.21-1)
  • Summary:
    A complete, highly portable implementation of the DNS protocol
  • License:
    • MPL2
  • Links(s):

bind

9.16.21 (9.16.21-1)
  • Summary:
    A complete, highly portable implementation of the DNS protocol
  • License:
    • MPL2
  • Links(s):

bind

9.16.21 (9.16.21-1)
  • Summary:
    A complete, highly portable implementation of the DNS protocol
  • License:
    • MPL2
  • Links(s):

dns/bind-tools

9.16.16 (9.16.16_1)

dns/bind911

9.11.32

dns/bind916

9.16.16 (9.16.16_2)

dns/samba-nsupdate

9.16.5 Potentially vulnerable

bind

9.16.16

bind

9.16.16

bind

9.16.16

bind

9.16.16

bind

9.16.16

bind

9.16.16

bind

9.11.4 Potentially vulnerable (32:9.11.4-13.oe1)

bind

9.16.21

bind

9.16.21

bind

9.16.20

bind

9.16.20
openmamba
devel

bind

9.17.9 Potentially vulnerable (9.17.9-1mamba)
OpenMandriva 4.0
main/release

bind

9.15.0 Potentially vulnerable (1:9.15.0-1)
OpenMandriva 4.0
main/release

bind

9.14.1 Potentially vulnerable (1:9.14.1-1)
OpenMandriva Cooker
main/release

bind

9.15.8 Potentially vulnerable (1:9.15.8-2)

bind

9.16.21
openSUSE Leap 42.3
updates/oss

bind

9.9.9P1 Potentially vulnerable (9.9.9P1-53.1)

bind

9.9.9P1 Potentially vulnerable (9.9.9P1-51.1)
openSUSE Leap 15.0
updates/oss

bind

9.11.2 Potentially vulnerable (9.11.2-lp150.8.13.1)
openSUSE Leap 15.0
updates/oss

bind

9.11.2 Potentially vulnerable (9.11.2-lp150.8.16.1)
openSUSE Leap 15.0
updates/oss

bind

9.11.2 Potentially vulnerable (9.11.2-lp150.8.3.1)
openSUSE Leap 15.0
updates/oss

bind

9.11.2 Potentially vulnerable (9.11.2-lp150.8.6.1)
openSUSE Leap 15.0
updates/oss

bind

9.11.2 Potentially vulnerable (9.11.2-lp150.8.9.1)

bind

9.11.2 Potentially vulnerable (9.11.2-lp150.7.2)
openSUSE Leap 15.1
updates/oss

bind

9.16.6 Potentially vulnerable (9.16.6-lp151.11.12.1)
openSUSE Leap 15.1
updates/oss

bind

9.16.6 Potentially vulnerable (9.16.6-lp151.11.15.1)
openSUSE Leap 15.1
updates/oss

bind

9.16.6 Potentially vulnerable (9.16.6-lp151.11.9.1)
openSUSE Leap 15.1
updates/oss

bind

9.11.2 Potentially vulnerable (9.11.2-lp151.11.3.1)
openSUSE Leap 15.1
updates/oss

bind

9.11.2 Potentially vulnerable (9.11.2-lp151.11.6.1)

bind

9.11.2 Potentially vulnerable (9.11.2-lp151.10.1)
openSUSE Leap 15.2
updates/oss

bind

9.16.6 Potentially vulnerable (9.16.6-lp152.14.12.1)
openSUSE Leap 15.2
updates/oss

bind

9.16.6 Potentially vulnerable (9.16.6-lp152.14.13.1)
openSUSE Leap 15.2
updates/oss

bind

9.16.6 Potentially vulnerable (9.16.6-lp152.14.19.1)
openSUSE Leap 15.2
updates/oss

bind

9.16.6 Potentially vulnerable (9.16.6-lp152.14.22.1)
openSUSE Leap 15.2
updates/oss

bind

9.16.6 Potentially vulnerable (9.16.6-lp152.14.3.1)
openSUSE Leap 15.2
updates/oss

bind

9.16.6 Potentially vulnerable (9.16.6-lp152.14.6.1)
openSUSE Leap 15.2
updates/oss

bind

9.16.6 Potentially vulnerable (9.16.6-lp152.14.9.1)

bind

9.11.2 Potentially vulnerable (9.11.2-lp152.13.6)

bind

9.16.6 Potentially vulnerable (9.16.6-20.39)

bind

9.16.20 (9.16.20-1.4)

bind

9.16.20 (9.16.20-382.18)

bind-check

9.10.4 Potentially vulnerable (9.10.4-P5-1)

bind-client

9.10.4 Potentially vulnerable (9.10.4-P5-1)

bind-dig

9.10.4 Potentially vulnerable (9.10.4-P5-1)

bind-dnssec

9.10.4 Potentially vulnerable (9.10.4-P5-1)

bind-host

9.10.4 Potentially vulnerable (9.10.4-P5-1)

bind-libs

9.10.4 Potentially vulnerable (9.10.4-P5-1)

bind-rndc

9.10.4 Potentially vulnerable (9.10.4-P5-1)

bind-server

9.10.4 Potentially vulnerable (9.10.4-P5-1)

bind-tools

9.10.4 Potentially vulnerable (9.10.4-P5-1)

bind-check

9.11.19 Potentially vulnerable (9.11.19-1)

bind-client

9.11.19 Potentially vulnerable (9.11.19-1)

bind-dig

9.11.19 Potentially vulnerable (9.11.19-1)

bind-dnssec

9.11.19 Potentially vulnerable (9.11.19-1)

bind-host

9.11.19 Potentially vulnerable (9.11.19-1)

bind-libs

9.11.19 Potentially vulnerable (9.11.19-1)

bind-rndc

9.11.19 Potentially vulnerable (9.11.19-1)

bind-server

9.11.19 Potentially vulnerable (9.11.19-1)

bind-tools

9.11.19 Potentially vulnerable (9.11.19-1)

bind-check

9.16.20 (9.16.20-1)

bind-client

9.16.20 (9.16.20-1)

bind-dig

9.16.20 (9.16.20-1)

bind-dnssec

9.16.20 (9.16.20-1)

bind-host

9.16.20 (9.16.20-1)

bind-libs

9.16.20 (9.16.20-1)

bind-nslookup

9.16.20 (9.16.20-1)

bind-rndc

9.16.20 (9.16.20-1)

bind-server

9.16.20 (9.16.20-1)

bind-server-filter-aaaa

9.16.20 (9.16.20-1)

bind-tools

9.16.20 (9.16.20-1)

bind-check

9.17.13 (9.17.13-1)

bind-client

9.17.13 (9.17.13-1)

bind-dig

9.17.13 (9.17.13-1)

bind-dnssec

9.17.13 (9.17.13-1)

bind-host

9.17.13 (9.17.13-1)

bind-libs

9.17.13 (9.17.13-1)

bind-nslookup

9.17.13 (9.17.13-1)

bind-rndc

9.17.13 (9.17.13-1)

bind-server

9.17.13 (9.17.13-1)

bind-server-filter-aaaa

9.17.13 (9.17.13-1)

bind-tools

9.17.13 (9.17.13-1)
Parabola
extra

bind

9.16.21 (9.16.21-1)

bind9

9.10.3 Potentially vulnerable (1:9.10.3.dfsg.P4-12.3+deb9u4)
Pardus 17
updates/main

bind9

9.10.3 Potentially vulnerable (1:9.10.3.dfsg.P4-12.3+deb9u5)
Pardus 17
updates/main

bind9

9.10.3 Potentially vulnerable (1:9.10.3.dfsg.P4-12.3+deb9u4)
Pardus 19
updates/main

bind9

9.11.5.P4 Potentially vulnerable (1:9.11.5.P4+dfsg-5.1+deb10u5)

bind9

9.16.15 (1:9.16.15-1)
Parrot
main

bind9

9.16.15 (1:9.16.15-1)

bind

9.10.8.P1 Potentially vulnerable (9.10.8.P1-1pclos2019)
  • Summary:
    A DNS (Domain Name System) server
  • Category:
    • System/Servers

bind

9.14.9 Potentially vulnerable

net/bind911

9.11.35

net/bind916

9.16.21

bind9

9.16.15 (1:9.16.15-1)

bind9

9.16.15 (1:9.16.15-1)

bind9

9.16.15 (1:9.16.15-1)

bind

9.16.21

bind

9.11.26 Potentially vulnerable (32:9.11.26-4.el8_4)
Rosa 2014.1
main/updates

bind

9.10.8.P1 Potentially vulnerable (9.10.8.P1-1)
Rosa 2014.1
main/release

bind

9.9.1 Potentially vulnerable (9.9.1-2.P2.1)
Rosa 2016.1
main/updates

bind

9.11.4.P1 Potentially vulnerable (9.11.4.P1-2)
Rosa 2016.1
main/release

bind

9.11.0.P2 Potentially vulnerable (9.11.0.P2-2)
Rosa 2019.1
main/release

bind

9.11.26 Potentially vulnerable (1:9.11.26-7)
Rosa 2019.1
main/release

bind

9.11.18 Potentially vulnerable (1:9.11.18-34)
Rosa Server 6.9
base/release

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.37.rc1.res6.4)
Rosa Server 6.9
base/release

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.37.rc1.res6.7)
Rosa Server 6.9
base/release

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.47.rc1.res6.4)
Rosa Server 6.9
base/release

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.62.rc1.res6.2)
Rosa Server 7.3
base/release

bind

9.9.4 Potentially vulnerable (32:9.9.4-72.res7c)
Rosa Server 7.5
base/release

bind

9.9.4 Potentially vulnerable (32:9.9.4-38.res7c.3)
Rosa Server 7.5
base/release

bind

9.9.4 Potentially vulnerable (32:9.9.4-61.res7)

bind

9.11.4 Potentially vulnerable (32:9.11.4-16.P2.el7_8.6)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Links(s):

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.el7)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Links(s):

bind

9.11.4 Potentially vulnerable (32:9.11.4-16.P2.el7_8.3)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Links(s):

bind

9.11.4 Potentially vulnerable (32:9.11.4-16.P2.el7)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Links(s):

bind

9.11.4 Potentially vulnerable (32:9.11.4-16.P2.el7_8.2)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Links(s):

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.el7_9.2)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Links(s):

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.el7_9.3)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Links(s):

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.el7_9.4)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Links(s):

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.el7_9.5)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Links(s):

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.el7_9.7)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Links(s):

bind

9.11.4 Potentially vulnerable (32:9.11.4-9.P2.el7)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-37.el7)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-38.el7_3.1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-38.el7_3.2)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-29.el7_2.4)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-14.el7)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-14.el7_0.1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-18.el7)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-18.el7_1.1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-18.el7_1.2)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-18.el7_1.3)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-18.el7_1.4)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-18.el7_1.5)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-29.el7)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-29.el7_2.1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-29.el7_2.2)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-29.el7_2.3)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-38.el7_3.3)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-38.el7_3)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-4.el7)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-50.el7)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-50.el7_3.1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-51.el7)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-51.el7_4.1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-51.el7_4.2)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-61.el7)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-61.el7_5.1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-72.el7)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-73.el7_6)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-74.el7_6.1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.9.4 Potentially vulnerable (32:9.9.4-74.el7_6.2)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • System Environment/Daemons
  • License:
    • ISC
  • Links(s):

bind

9.11.31
Slackware 14.2
slackware

bind

9.10.4_P1 Potentially vulnerable

bind

9.16.21

bind

9.11.31
Slackware64 14.2
slackware64

bind

9.10.4_P1 Potentially vulnerable

bind

9.16.21

bind

9.11.31

bind

9.10.4_P1 Potentially vulnerable

bind

9.16.21

bind

9.14.9 Potentially vulnerable

bind-client

9.14.9 Potentially vulnerable

bind-dev

9.14.9 Potentially vulnerable

libbind

9.14.9 Potentially vulnerable

bind

9.12.3 Potentially vulnerable

bind-client

9.12.3 Potentially vulnerable

bind-dev

9.12.3 Potentially vulnerable

bind-lib

9.12.3 Potentially vulnerable

bind-utils

9.17.8 Potentially vulnerable

bind-utils-dbginfo

9.17.8 Potentially vulnerable

bind

9.7.2-P3 Potentially vulnerable

dnsutils

9.16.11 Potentially vulnerable
Trisquel 6.0
toutatis-updates/main

bind9

9.8.1 Potentially vulnerable (1:9.8.1.dfsg.P1-4ubuntu0.22)
Trisquel 6.0
toutatis/main

bind9

9.8.1 Potentially vulnerable (1:9.8.1.dfsg.P1-4)
Trisquel 7.0
belenos/main

bind9

9.9.5 Potentially vulnerable (1:9.9.5.dfsg-3)
Trisquel 7.0
belenos-updates/main

bind9

9.9.5 Potentially vulnerable (1:9.9.5.dfsg-3ubuntu0.19)
Trisquel 8.0
flidas-updates/main

bind9

9.10.3 Potentially vulnerable (1:9.10.3.dfsg.P4-8ubuntu1.19)
Trisquel 8.0
flidas/main

bind9

9.10.3 Potentially vulnerable (1:9.10.3.dfsg.P4-8)
Ubuntu 14.04
trusty-updates/main

bind9

9.9.5 Potentially vulnerable (1:9.9.5.dfsg-3ubuntu0.19)
Ubuntu 14.04
trusty/main

bind9

9.9.5 Potentially vulnerable (1:9.9.5.dfsg-3)