Versions Packages Information History CVEs Related Badges Report

Packages for bind

780 package(s) known

bind

9.16.35 Potentially vulnerable (9.16.35-r0)

bind-dbg

9.16.35 Potentially vulnerable (9.16.35-r0)

bind-dev

9.16.35 Potentially vulnerable (9.16.35-r0)

bind-doc

9.16.35 Potentially vulnerable (9.16.35-r0)

bind-libs

9.16.35 Potentially vulnerable (9.16.35-r0)

bind-openrc

9.16.35 Potentially vulnerable (9.16.35-r0)

bind-tools

9.16.35 Potentially vulnerable (9.16.35-r0)

bind

9.14.5 Potentially vulnerable (9.14.5-2)

bind

9.11.36 Potentially vulnerable (32:9.11.36-11.el8_9)
AlmaLinux 8
AppStream

bind9.16

9.16.23 Potentially vulnerable (32:9.16.23-0.14.el8_8.2.alma.1)
AlmaLinux 9
AppStream

bind

9.16.23 Potentially vulnerable (32:9.16.23-14.el9_3)

bind-dev

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind-dnssec-tools

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind-doc

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind-libs

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind-openrc

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

py3-bind

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind-dev

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind-dnssec-tools

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind-doc

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind-libs

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind-openrc

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

py3-bind

9.12.4_p2 Potentially vulnerable (9.12.4_p2-r0)

bind-dev

9.16.15 Potentially vulnerable (9.16.15-r2)

bind-dnssec-root

9.16.15 Potentially vulnerable (9.16.15-r2)

bind-dnssec-tools

9.16.15 Potentially vulnerable (9.16.15-r2)

bind-doc

9.16.15 Potentially vulnerable (9.16.15-r2)

bind-libs

9.16.15 Potentially vulnerable (9.16.15-r2)

bind-openrc

9.16.15 Potentially vulnerable (9.16.15-r2)

bind-plugins

9.16.15 Potentially vulnerable (9.16.15-r2)

py3-bind

9.16.15 Potentially vulnerable (9.16.15-r2)

bind-dev

9.16.20 Potentially vulnerable (9.16.20-r1)

bind-dnssec-root

9.16.20 Potentially vulnerable (9.16.20-r1)

bind-dnssec-tools

9.16.20 Potentially vulnerable (9.16.20-r1)

bind-doc

9.16.20 Potentially vulnerable (9.16.20-r1)

bind-libs

9.16.20 Potentially vulnerable (9.16.20-r1)

bind-openrc

9.16.20 Potentially vulnerable (9.16.20-r1)

bind-plugins

9.16.20 Potentially vulnerable (9.16.20-r1)

py3-bind

9.16.20 Potentially vulnerable (9.16.20-r1)

bind-dev

9.16.27 Potentially vulnerable (9.16.27-r1)

bind-dnssec-root

9.16.27 Potentially vulnerable (9.16.27-r1)

bind-dnssec-tools

9.16.27 Potentially vulnerable (9.16.27-r1)

bind-doc

9.16.27 Potentially vulnerable (9.16.27-r1)

bind-libs

9.16.27 Potentially vulnerable (9.16.27-r1)

bind-openrc

9.16.27 Potentially vulnerable (9.16.27-r1)

bind-plugins

9.16.27 Potentially vulnerable (9.16.27-r1)

bind-tools

9.16.27 Potentially vulnerable (9.16.27-r1)

py3-bind

9.16.27 Potentially vulnerable (9.16.27-r1)

bind-dev

9.16.33 Potentially vulnerable (9.16.33-r0)

bind-dnssec-root

9.16.33 Potentially vulnerable (9.16.33-r0)

bind-dnssec-tools

9.16.33 Potentially vulnerable (9.16.33-r0)

bind-doc

9.16.33 Potentially vulnerable (9.16.33-r0)

bind-libs

9.16.33 Potentially vulnerable (9.16.33-r0)

bind-openrc

9.16.33 Potentially vulnerable (9.16.33-r0)

bind-plugins

9.16.33 Potentially vulnerable (9.16.33-r0)

bind-tools

9.16.33 Potentially vulnerable (9.16.33-r0)

py3-bind

9.16.33 Potentially vulnerable (9.16.33-r0)

bind-dev

9.16.39 Potentially vulnerable (9.16.39-r0)

bind-dnssec-root

9.16.39 Potentially vulnerable (9.16.39-r0)

bind-dnssec-tools

9.16.39 Potentially vulnerable (9.16.39-r0)

bind-doc

9.16.39 Potentially vulnerable (9.16.39-r0)

bind-libs

9.16.39 Potentially vulnerable (9.16.39-r0)

bind-openrc

9.16.39 Potentially vulnerable (9.16.39-r0)

bind-plugins

9.16.39 Potentially vulnerable (9.16.39-r0)

bind-tools

9.16.39 Potentially vulnerable (9.16.39-r0)

py3-bind

9.16.39 Potentially vulnerable (9.16.39-r0)

bind-dbg

9.16.44 (9.16.44-r0)

bind-dev

9.16.44 (9.16.44-r0)

bind-dnssec-root

9.16.44 (9.16.44-r0)

bind-dnssec-tools

9.16.44 (9.16.44-r0)

bind-doc

9.16.44 (9.16.44-r0)

bind-libs

9.16.44 (9.16.44-r0)

bind-openrc

9.16.44 (9.16.44-r0)

bind-plugins

9.16.44 (9.16.44-r0)

bind-tools

9.16.44 (9.16.44-r0)

py3-bind

9.16.44 (9.16.44-r0)

bind-dbg

9.16.44 (9.16.44-r0)

bind-dev

9.16.44 (9.16.44-r0)

bind-dnssec-root

9.16.44 (9.16.44-r0)

bind-dnssec-tools

9.16.44 (9.16.44-r0)

bind-doc

9.16.44 (9.16.44-r0)

bind-libs

9.16.44 (9.16.44-r0)

bind-openrc

9.16.44 (9.16.44-r0)

bind-plugins

9.16.44 (9.16.44-r0)

bind-tools

9.16.44 (9.16.44-r0)

py3-bind

9.16.44 (9.16.44-r0)

bind-dbg

9.18.19 (9.18.19-r0)

bind-dev

9.18.19 (9.18.19-r0)

bind-dnssec-root

9.18.19 (9.18.19-r0)

bind-dnssec-tools

9.18.19 (9.18.19-r0)

bind-doc

9.18.19 (9.18.19-r0)

bind-libs

9.18.19 (9.18.19-r0)

bind-openrc

9.18.19 (9.18.19-r0)

bind-plugins

9.18.19 (9.18.19-r0)

bind-tools

9.18.19 (9.18.19-r0)

bind

9.18.19 (9.18.19-r0)

bind-dbg

9.18.19 (9.18.19-r0)

bind-dev

9.18.19 (9.18.19-r0)

bind-dnssec-root

9.18.19 (9.18.19-r0)

bind-dnssec-tools

9.18.19 (9.18.19-r0)

bind-doc

9.18.19 (9.18.19-r0)

bind-libs

9.18.19 (9.18.19-r0)

bind-openrc

9.18.19 (9.18.19-r0)

bind-plugins

9.18.19 (9.18.19-r0)

bind-tools

9.18.19 (9.18.19-r0)

bind

9.18.19 (9.18.19-r1)

bind-dbg

9.18.19 (9.18.19-r1)

bind-dev

9.18.19 (9.18.19-r1)

bind-dnssec-root

9.18.19 (9.18.19-r1)

bind-dnssec-tools

9.18.19 (9.18.19-r1)

bind-doc

9.18.19 (9.18.19-r1)

bind-libs

9.18.19 (9.18.19-r1)

bind-openrc

9.18.19 (9.18.19-r1)

bind-plugins

9.18.19 (9.18.19-r1)

bind-tools

9.18.19 (9.18.19-r1)

bind

9.11.37 Potentially vulnerable (9.11.37-alt1)

bind

9.16.44 (9.16.44-alt1)

bind

9.18.19 (9.18.19-alt1)

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.90.amzn1)

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.87.amzn1)

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.85.amzn1)

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.86.amzn1)

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.59.amzn1)

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.62.rc1.57.amzn1)

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.64.amzn1)

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.58.amzn1)

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.60.amzn1)

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.91.amzn1)

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.amzn2.5.2)

bind

9.11.4 Potentially vulnerable (32:9.11.4-9.P2.amzn2.0.3)

bind

9.11.4 Potentially vulnerable (32:9.11.4-9.P2.amzn2.0.2)

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.amzn2.5)

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.amzn2.13.3)

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.amzn2.13)

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.amzn2.4)

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.amzn2.13.4)

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.amzn2.13.1)

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.amzn2.13.5)

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.amzn2.2)

bind

9.11.4 Potentially vulnerable (32:9.11.4-9.P2.amzn2.0.4)

bind

9.9.4 Potentially vulnerable (32:9.9.4-61.amzn2.0.2)

bind

9.9.4 Potentially vulnerable (32:9.9.4-51.amzn2)

bind

9.9.4 Potentially vulnerable (32:9.9.4-73.amzn2.1.2)

bind

9.9.4 Potentially vulnerable (32:9.9.4-61.amzn2.1.1)

bind

9.9.4 Potentially vulnerable (32:9.9.4-61.amzn2.0.1)

bind

9.9.4 Potentially vulnerable (32:9.9.4-74.amzn2.1.2)

bind

9.9.4 Potentially vulnerable (32:9.9.4-51.amzn2.2)

bind

9.9.4 Potentially vulnerable (32:9.9.4-73.amzn2.1.1)
Arch
extra

bind

9.18.20 (9.18.20-1)

bind

9.18.14 Potentially vulnerable (9.18.14-1.0)

bind-tools

9.16.5 Potentially vulnerable (9.16.5-1.0)

bind

9.18.19 (9.18.19-1.0)

bind-tools

9.16.5 Potentially vulnerable (9.16.5-1.0)

bind

9.18.19 (9.18.19-1.0)

bind-tools

9.16.5 Potentially vulnerable (9.16.5-1.0)

bind

9.18.20 (9.18.20-1)

bind

9.18.18 Potentially vulnerable (9.18.18-1)
  • Summary:
    A complete, highly portable implementation of the DNS protocol
  • License:
    • MPL2
  • Link(s):

bind

9.18.18 Potentially vulnerable (9.18.18-1)
  • Summary:
    A complete, highly portable implementation of the DNS protocol
  • License:
    • MPL2
  • Link(s):

bind

9.18.18 Potentially vulnerable (9.18.18-1)
  • Summary:
    A complete, highly portable implementation of the DNS protocol
  • License:
    • MPL2
  • Link(s):

bind-git

9.main.r40093.8983bf8ed2 (9.main.r40093.8983bf8ed2-1)
Artix
world

bind

9.18.20 (9.18.20-1)
  • Summary:
    A complete, highly portable implementation of the DNS protocol
  • License:
    • MPL2
  • Link(s):

bind

9.18.20 (9.18.20-1)

bind

9.18.19

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.el6)
CentOS 6
updates

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.el6_10.1)
CentOS 6
updates

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.el6_10.3)
CentOS 6
updates

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.el6_10.7)
CentOS 6
updates

bind

9.8.2-rc1 Potentially vulnerable (32:9.8.2-0.68.rc1.el6_10.8)
CentOS 7
updates

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.el7_9.8)

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.el7)
CentOS 7
updates

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.el7_9.10)
CentOS 7
updates

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.el7_9.13)
CentOS 7
updates

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.el7_9.14)
CentOS 7
updates

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.el7_9.15)
CentOS 7
updates

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.el7_9.2)
CentOS 7
updates

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.el7_9.3)
CentOS 7
updates

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.el7_9.4)
CentOS 7
updates

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.el7_9.5)
CentOS 7
updates

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.el7_9.7)
CentOS 7
updates

bind

9.11.4 Potentially vulnerable (32:9.11.4-26.P2.el7_9.9)
CentOS 8
BaseOS

bind

9.11.26 Potentially vulnerable (32:9.11.26-6.el8)

bind

9.11.36 Potentially vulnerable (32:9.11.36-11.el8)

bind

9.11.36 Potentially vulnerable (32:9.11.36-2.el8)

bind

9.11.36 Potentially vulnerable (32:9.11.36-3.el8)

bind

9.11.36 Potentially vulnerable (32:9.11.36-4.el8)

bind

9.11.36 Potentially vulnerable (32:9.11.36-5.el8)

bind

9.11.36 Potentially vulnerable (32:9.11.36-7.el8)

bind

9.11.36 Potentially vulnerable (32:9.11.36-8.el8)

bind

9.11.36 Potentially vulnerable (32:9.11.36-9.el8)

bind

9.11.26 Potentially vulnerable (32:9.11.26-3.el8)

bind

9.11.26 Potentially vulnerable (32:9.11.26-4.el8_4)

bind

9.11.26 Potentially vulnerable (32:9.11.26-6.el8)
CentOS Stream 8
AppStream

bind9.16

9.16.23 Potentially vulnerable (32:9.16.23-0.11.el8)
CentOS Stream 8
AppStream

bind9.16

9.16.23 Potentially vulnerable (32:9.16.23-0.12.el8)
CentOS Stream 8
AppStream

bind9.16

9.16.23 Potentially vulnerable (32:9.16.23-0.5.el8)
CentOS Stream 8
AppStream

bind9.16

9.16.23 Potentially vulnerable (32:9.16.23-0.7.el8)
CentOS Stream 8
AppStream

bind9.16

9.16.23 Potentially vulnerable (32:9.16.23-0.9.el8.1)
CentOS Stream 8
AppStream

bind9.16

9.16.23 Potentially vulnerable (32:9.16.23-0.9.el8)
CentOS Stream 9
AppStream

bind

9.16.23 Potentially vulnerable (32:9.16.23-11.el9)
CentOS Stream 9
AppStream

bind

9.16.23 Potentially vulnerable (32:9.16.23-13.el9)
CentOS Stream 9
AppStream

bind

9.16.23 Potentially vulnerable (32:9.16.23-7.el9)
CentOS Stream 9
AppStream

bind

9.16.23 Potentially vulnerable (32:9.16.23-8.el9)
CentOS Stream 9
AppStream

bind

9.16.23 Potentially vulnerable (32:9.16.23-9.el9)
CRUX 3.4
contrib

bind

9.14.2 Potentially vulnerable
CRUX 3.5
contrib

bind

9.16.9 Potentially vulnerable
CRUX 3.7
contrib

bind

9.18.20

bind

9.11.9 Potentially vulnerable (9.11.9-1)

bind-debuginfo

9.11.9 Potentially vulnerable (9.11.9-1)

bind-doc

9.11.9 Potentially vulnerable (9.11.9-1)

bind-utils

9.11.9 Potentially vulnerable (9.11.9-1)

libbind9-devel

9.11.9 Potentially vulnerable (9.11.9-1)

libbind9_160

9.11.9 Potentially vulnerable (9.11.9-1)

libbind9_161

9.11.9 Potentially vulnerable (9.11.9-1)

libdns1104

9.11.9 Potentially vulnerable (9.11.9-1)

libdns1105

9.11.9 Potentially vulnerable (9.11.9-1)

libdns1106

9.11.9 Potentially vulnerable (9.11.9-1)

libdns166

9.11.9 Potentially vulnerable (9.11.9-1)

libdns169

9.11.9 Potentially vulnerable (9.11.9-1)

libirs160

9.11.9 Potentially vulnerable (9.11.9-1)

libirs161

9.11.9 Potentially vulnerable (9.11.9-1)

libisc1100

9.11.9 Potentially vulnerable (9.11.9-1)

libisc160

9.11.9 Potentially vulnerable (9.11.9-1)

libisc166

9.11.9 Potentially vulnerable (9.11.9-1)

libisccc160

9.11.9 Potentially vulnerable (9.11.9-1)

libisccc161

9.11.9 Potentially vulnerable (9.11.9-1)

libisccfg160

9.11.9 Potentially vulnerable (9.11.9-1)

libisccfg163

9.11.9 Potentially vulnerable (9.11.9-1)

liblwres160

9.11.9 Potentially vulnerable (9.11.9-1)

liblwres161

9.11.9 Potentially vulnerable (9.11.9-1)

python27-isc

9.11.9 Potentially vulnerable (9.11.9-1)

python36-isc

9.11.9 Potentially vulnerable (9.11.9-1)

python37-isc

9.11.9 Potentially vulnerable (9.11.9-1)
Devuan 3.0
beowulf/main

bind9

9.11.5.P4 Potentially vulnerable (1:9.11.5.P4+dfsg-5.1+deb10u7)
Devuan 4.0
chimaera/main

bind9

9.16.44 (1:9.16.44-1~deb11u1)
Devuan Unstable
unstable/main

bind9

9.19.17 (1:9.19.17-1)

bind

9.18.20
Entware
mipssf-k3.4

bind-check

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
x64-k3.2

bind-check

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
armv7sf-k3.2

bind-check

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
aarch64-k3.10

bind-check

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
armv7sf-k2.6

bind-check

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
mipselsf-k3.4

bind-check

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
armv5sf-k3.2

bind-check

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
mipssf-k3.4

bind-client

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
x64-k3.2

bind-client

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
armv7sf-k3.2

bind-client

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
aarch64-k3.10

bind-client

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
mipselsf-k3.4

bind-client

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
armv5sf-k3.2

bind-client

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
armv7sf-k2.6

bind-client

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
mipssf-k3.4

bind-ddns-confgen

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
x64-k3.2

bind-ddns-confgen

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
armv7sf-k3.2

bind-ddns-confgen

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
aarch64-k3.10

bind-ddns-confgen

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
mipselsf-k3.4

bind-ddns-confgen

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
armv5sf-k3.2

bind-ddns-confgen

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
armv7sf-k2.6

bind-ddns-confgen

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
mipssf-k3.4

bind-dig

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
x64-k3.2

bind-dig

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
aarch64-k3.10

bind-dig

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
mipselsf-k3.4

bind-dig

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
armv5sf-k3.2

bind-dig

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
armv7sf-k2.6

bind-dig

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
armv7sf-k3.2

bind-dig

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
mipssf-k3.4

bind-dnssec

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
x64-k3.2

bind-dnssec

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
aarch64-k3.10

bind-dnssec

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
mipselsf-k3.4

bind-dnssec

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
armv5sf-k3.2

bind-dnssec

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
armv7sf-k2.6

bind-dnssec

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
armv7sf-k3.2

bind-dnssec

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
mipssf-k3.4

bind-host

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
aarch64-k3.10

bind-host

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
x64-k3.2

bind-host

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
armv7sf-k2.6

bind-host

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
mipselsf-k3.4

bind-host

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
armv5sf-k3.2

bind-host

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
armv7sf-k3.2

bind-host

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
mipssf-k3.4

bind-libs

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
aarch64-k3.10

bind-libs

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
x64-k3.2

bind-libs

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
mipselsf-k3.4

bind-libs

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
armv7sf-k2.6

bind-libs

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
armv5sf-k3.2

bind-libs

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
armv7sf-k3.2

bind-libs

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
mipssf-k3.4

bind-nslookup

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
armv7sf-k2.6

bind-nslookup

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
aarch64-k3.10

bind-nslookup

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
x64-k3.2

bind-nslookup

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
mipselsf-k3.4

bind-nslookup

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
armv5sf-k3.2

bind-nslookup

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
armv7sf-k3.2

bind-nslookup

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
armv7sf-k2.6

bind-rndc

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
mipssf-k3.4

bind-rndc

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
x64-k3.2

bind-rndc

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
mipselsf-k3.4

bind-rndc

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
aarch64-k3.10

bind-rndc

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
armv5sf-k3.2

bind-rndc

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
armv7sf-k3.2

bind-rndc

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
armv7sf-k2.6

bind-server

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
mipssf-k3.4

bind-server

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
x64-k3.2

bind-server

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
mipselsf-k3.4

bind-server

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
aarch64-k3.10

bind-server

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
armv5sf-k3.2

bind-server

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
armv7sf-k3.2

bind-server

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
mipssf-k3.4

bind-server-filter-aaaa

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
armv7sf-k2.6

bind-server-filter-aaaa

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
x64-k3.2

bind-server-filter-aaaa

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
mipselsf-k3.4

bind-server-filter-aaaa

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
aarch64-k3.10

bind-server-filter-aaaa

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
armv5sf-k3.2

bind-server-filter-aaaa

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
armv7sf-k3.2

bind-server-filter-aaaa

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
mipssf-k3.4

bind-tools

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
armv7sf-k2.6

bind-tools

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
x64-k3.2

bind-tools

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
mipselsf-k3.4

bind-tools

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
armv5sf-k3.2

bind-tools

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
aarch64-k3.10

bind-tools

9.18.16 Potentially vulnerable (9.18.16-1)
Entware
armv7sf-k3.2

bind-tools

9.18.16 Potentially vulnerable (9.18.16-1)
EuroLinux 8
appstream

bind

9.11.36 Potentially vulnerable (32:9.11.36-3.el8)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Link(s):
EuroLinux 8
appstream

bind

9.11.36 Potentially vulnerable (32:9.11.36-8.el8_8.1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Link(s):
EuroLinux 8
appstream

bind

9.11.36 Potentially vulnerable (32:9.11.36-8.el8_8.2)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Link(s):

bind

9.11.36 Potentially vulnerable (32:9.11.36-11.el8_9)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Link(s):

bind

9.11.36 Potentially vulnerable (32:9.11.36-3.el8_6.1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Link(s):

bind

9.11.36 Potentially vulnerable (32:9.11.36-5.el8)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Link(s):

bind

9.11.36 Potentially vulnerable (32:9.11.36-5.el8_7.2)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Link(s):

bind

9.11.36 Potentially vulnerable (32:9.11.36-8.el8_8.2)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Link(s):

bind

9.11.26 Potentially vulnerable (32:9.11.26-4.el8_4)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Link(s):

bind

9.11.26 Potentially vulnerable (32:9.11.26-6.el8)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Link(s):

bind

9.11.20 Potentially vulnerable (32:9.11.20-5.el8)

bind

9.11.20 Potentially vulnerable (32:9.11.20-5.el8_3.1)
EuroLinux 8
appstream

bind9.16

9.16.23 Potentially vulnerable (32:9.16.23-0.14.el8_8.1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Link(s):
EuroLinux 8
appstream

bind9.16

9.16.23 Potentially vulnerable (32:9.16.23-0.14.el8_8.2)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Link(s):
EuroLinux 8
appstream

bind9.16

9.16.23 Potentially vulnerable (32:9.16.23-0.7.el8)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Link(s):
EuroLinux 8
appstream

bind9.16

9.16.23 Potentially vulnerable (32:9.16.23-0.7.el8_6.1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Link(s):
EuroLinux 8
appstream

bind9.16

9.16.23 Potentially vulnerable (32:9.16.23-0.9.el8.1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Link(s):
EuroLinux 9
appstream

bind

9.16.23 Potentially vulnerable (32:9.16.23-1.el9)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Link(s):
EuroLinux 9
appstream

bind

9.16.23 Potentially vulnerable (32:9.16.23-1.el9_0.1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Link(s):
EuroLinux 9
appstream

bind

9.16.23 Potentially vulnerable (32:9.16.23-11.el9)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Link(s):
EuroLinux 9
appstream

bind

9.16.23 Potentially vulnerable (32:9.16.23-11.el9_2.1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Link(s):
EuroLinux 9
appstream

bind

9.16.23 Potentially vulnerable (32:9.16.23-11.el9_2.2)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Link(s):
EuroLinux 9
appstream

bind

9.16.23 Potentially vulnerable (32:9.16.23-14.el9_3)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Link(s):
EuroLinux 9
appstream

bind

9.16.23 Potentially vulnerable (32:9.16.23-4.el9)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Link(s):
EuroLinux 9
appstream

bind

9.16.23 Potentially vulnerable (32:9.16.23-5.el9_1)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Link(s):

bind

9.16.23 Potentially vulnerable (32:9.16.23-1.el9)
  • Summary:
    The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
  • Category:
    • Unspecified
  • License:
    • MPLv2.0
  • Link(s):
Exherbo
arbor

net-dns/bind-tools

9.16.44
Fedora 26
updates

bind

9.11.2 Potentially vulnerable (32:9.11.2-1.P1.fc26)
Fedora 26
release

bind

9.11.1 Potentially vulnerable (32:9.11.1-1.P1.fc26)
Fedora 26
updates

bind99

9.9.10 Potentially vulnerable (9.9.10-3.P3.fc26)
Fedora 26
release

bind99

9.9.9 Potentially vulnerable (9.9.9-5.P8.fc26)
Fedora 27
updates

bind

9.11.4 Potentially vulnerable (32:9.11.4-3.P2.fc27)
Fedora 27
release

bind

9.11.1 Potentially vulnerable (32:9.11.1-7.P3.fc27)
Fedora 27
updates

bind99

9.9.11 Potentially vulnerable (9.9.11-3.fc27)
Fedora 27
release

bind99

9.9.11 Potentially vulnerable (9.9.11-2.fc27)
Fedora 28
updates

bind

9.11.4 Potentially vulnerable (32:9.11.4-13.P2.fc28)
Fedora 28
release

bind

9.11.3 Potentially vulnerable (32:9.11.3-6.fc28)
Fedora 28
release

bind99

9.9.11 Potentially vulnerable (9.9.11-4.fc28)
Fedora 29
updates

bind

9.11.10 Potentially vulnerable (32:9.11.10-1.fc29)
Fedora 29
release

bind

9.11.4 Potentially vulnerable (32:9.11.4-10.P2.fc29)
Fedora 30
updates

bind

9.11.14 Potentially vulnerable (32:9.11.14-2.fc30)
Fedora 30
release

bind

9.11.5 Potentially vulnerable (32:9.11.5-13.P4.fc30)
Fedora 31
updates

bind

9.11.22 Potentially vulnerable (32:9.11.22-1.fc31)
Fedora 31
release

bind

9.11.11 Potentially vulnerable (32:9.11.11-1.fc31)
Fedora 32
updates

bind

9.11.28 Potentially vulnerable (32:9.11.28-1.fc32)
Fedora 32
release

bind

9.11.17 Potentially vulnerable (32:9.11.17-1.fc32)
Fedora 33
updates

bind

9.11.36 Potentially vulnerable (32:9.11.36-1.fc33)
Fedora 33
release

bind

9.11.23 Potentially vulnerable (32:9.11.23-1.fc33)
Fedora 34
updates

bind

9.16.27 Potentially vulnerable (32:9.16.27-1.fc34)
Fedora 34
release

bind

9.16.11 Potentially vulnerable (32:9.16.11-5.fc34)
Fedora 35
updates

bind

9.16.33 Potentially vulnerable (32:9.16.33-1.fc35)
Fedora 35
release

bind

9.16.21 Potentially vulnerable (32:9.16.21-1.fc35)
Fedora 36
updates

bind

9.16.40 Potentially vulnerable (32:9.16.40-1.fc36)
Fedora 36
release

bind

9.16.27 Potentially vulnerable (32:9.16.27-1.fc36)
Fedora 37
updates

bind

9.18.19 (32:9.18.19-1.fc37)
Fedora 37
release

bind

9.18.7 Potentially vulnerable (32:9.18.7-1.fc37)
Fedora 38
updates

bind

9.18.19 (32:9.18.19-1.fc38)
Fedora 38
release

bind

9.18.13 Potentially vulnerable (32:9.18.13-1.fc38)
Fedora 39
updates

bind

9.18.20 (32:9.18.20-1.fc39)
Fedora 39
development

bind

9.18.17 Potentially vulnerable (32:9.18.17-1.fc39)
Fedora Rawhide
development

bind

9.18.20 (32:9.18.20-1.fc40)

dns/bind-tools

9.18.20 (9.18.20_1)

dns/bind9-devel

9.19.3.2022.06.16 Potentially vulnerable (9.19.3.2022.06.16_1)

dns/bind916

9.16.45 (9.16.45_1)

dns/bind918

9.18.20 (9.18.20_1)

dns/samba-nsupdate

9.16.5 Potentially vulnerable

net-dns/bind

9.16.42 Potentially vulnerable

net-dns/bind

9.16.41 Potentially vulnerable

net-dns/bind

9.16.39 Potentially vulnerable

net-dns/bind

9.16.37 Potentially vulnerable

net-dns/bind-tools

9.16.42 Potentially vulnerable

net-dns/bind-tools

9.16.41 Potentially vulnerable

net-dns/bind-tools

9.16.39 Potentially vulnerable

net-dns/bind-tools

9.16.37 Potentially vulnerable (9.16.37-r1)

bind

9.16.38 Potentially vulnerable

Bind

9.11.1 Potentially vulnerable
HP-UX 11.31
hppa_32

dig

2.0 Potentially vulnerable
HP-UX 11.31
ia64_32

dig

2.0 Potentially vulnerable

bind9

9.19.17 (1:9.19.17-2~kali1)
KaOS
core

dnsutils

9.18.20 (9.18.20-1)

net-dns/bind

9.19.16 Potentially vulnerable

net-dns/bind

9.19.14 Potentially vulnerable

net-dns/bind

9.18.18 Potentially vulnerable

net-dns/bind

9.18.17 Potentially vulnerable

net-dns/bind-tools

9.19.16 Potentially vulnerable

net-dns/bind-tools

9.19.14 Potentially vulnerable

net-dns/bind-tools

9.18.18 Potentially vulnerable

net-dns/bind-tools

9.18.17 Potentially vulnerable

net-dns/bind

9.19.18

net-dns/bind

9.19.17

net-dns/bind

9.18.20

net-dns/bind

9.18.19

net-dns/bind-tools

9.19.18

net-dns/bind-tools

9.19.17

net-dns/bind-tools

9.18.18 Potentially vulnerable

net-dns/bind-tools

9.18.17 Potentially vulnerable
Mageia 8
core/updates

bind

9.11.37 Potentially vulnerable (9.11.37-1.1.mga8)
Mageia 8
core/updates

bind

9.11.37 Potentially vulnerable (9.11.37-1.mga8)
Mageia 8
core/updates

bind

9.11.36 Potentially vulnerable (9.11.36-1.1.mga8)
Mageia 8
core/updates

bind

9.11.31 Potentially vulnerable (9.11.31-1.1.mga8)
Mageia 8
core/release

bind

9.11.27 Potentially vulnerable (9.11.27-1.mga8)
Mageia 8
core/updates

bind

9.11.27 Potentially vulnerable (9.11.27-1.1.mga8)
Mageia cauldron
core/release

bind

9.18.19 (9.18.19-1.mga10)

bind

9.18.20 (9.18.20-1)
  • Summary:
    A complete, highly portable implementation of the DNS protocol
  • License:
    • MPL2
  • Link(s):

bind

9.18.20 (9.18.20-1)
  • Summary:
    A complete, highly portable implementation of the DNS protocol
  • License:
    • MPL2
  • Link(s):

bind

9.18.20 (9.18.20-1)
  • Summary:
    A complete, highly portable implementation of the DNS protocol
  • License:
    • MPL2
  • Link(s):

dns/bind-tools

9.18.19

dns/bind916

9.16.44

dns/bind918

9.18.19

dns/samba-nsupdate

9.16.5 Potentially vulnerable

bind

9.16.27 Potentially vulnerable

bind

9.16.27 Potentially vulnerable

bind

9.16.27 Potentially vulnerable

bind

9.18.7 Potentially vulnerable

bind

9.18.7 Potentially vulnerable

bind

9.18.7 Potentially vulnerable

bind

9.18.11 Potentially vulnerable

bind

9.18.11 Potentially vulnerable

bind

9.18.11 Potentially vulnerable

bind

9.18.19

bind

9.18.19

bind

9.18.19

bind

9.18.19

bind

9.18.20

bind

9.18.20

bind

9.18.20

bind

9.18.20

bind

9.11.4 Potentially vulnerable (32:9.11.4-13.oe1)

bind

9.16.23 Potentially vulnerable (32:9.16.23-6.oe2203)

bind

9.18.19

bind

9.18.19
openmamba
devel

bind

9.18.20 (9.18.20-1mamba)
OpenMandriva 4.0
main/release

bind

9.15.0 Potentially vulnerable (1:9.15.0-1)
OpenMandriva 4.0
main/release

bind

9.14.1 Potentially vulnerable (1:9.14.1-1)
OpenMandriva 4.1
main/release

bind

9.15.8 Potentially vulnerable (1:9.15.8-1)
OpenMandriva 4.2
main/updates

bind

9.17.6 Potentially vulnerable (1:9.17.6-1)
OpenMandriva 4.2
main/release

bind

9.15.8 Potentially vulnerable (1:9.15.8-2)
OpenMandriva 4.3
main/release

bind

9.17.20 Potentially vulnerable (1:9.17.20-2)

bind

9.18.19 (1:9.18.19-1)
OpenMandriva Cooker
main/release

bind

9.18.20 (1:9.18.20-1)

bind

9.18.18 Potentially vulnerable
openSUSE Leap 42.3
updates/oss

bind

9.9.9P1 Potentially vulnerable (9.9.9P1-53.1)

bind

9.9.9P1 Potentially vulnerable (9.9.9P1-51.1)
openSUSE Leap 15.0
updates/sle

bind

9.16.6 Potentially vulnerable (9.16.6-12.54.2)
openSUSE Leap 15.0
updates/sle

bind

9.16.6 Potentially vulnerable (9.16.6-12.57.1)
  • Summary:
    Domain Name System (DNS) Server (named)
  • Category:
    • Productivity/Networking/DNS/Servers
  • License:
    • MPL-2.0
  • Link(s):