Versions Packages Information History CVEs Related Badges Report

Packages for unbound

331 package(s) known

unbound

1.9.6 Potentially vulnerable (1.9.6-r0)

unbound-dbg

1.9.6 Potentially vulnerable (1.9.6-r0)

unbound-dev

1.9.6 Potentially vulnerable (1.9.6-r0)

unbound-doc

1.9.6 Potentially vulnerable (1.9.6-r0)

unbound-openrc

1.9.6 Potentially vulnerable (1.9.6-r0)

unbound-python

1.9.6 Potentially vulnerable (1.9.6-r0)

py-unbound

1.7.3 Potentially vulnerable (1.7.3-r2)

unbound

1.7.3 Potentially vulnerable (1.7.3-r2)

unbound-dbg

1.7.3 Potentially vulnerable (1.7.3-r2)

unbound-dev

1.7.3 Potentially vulnerable (1.7.3-r2)

unbound-doc

1.7.3 Potentially vulnerable (1.7.3-r2)

unbound-libs

1.7.3 Potentially vulnerable (1.7.3-r2)

unbound-migrate

1.7.3 Potentially vulnerable (1.7.3-r2)

py-unbound

1.8.3 Potentially vulnerable (1.8.3-r4)

unbound

1.8.3 Potentially vulnerable (1.8.3-r4)

unbound-dbg

1.8.3 Potentially vulnerable (1.8.3-r4)

unbound-dev

1.8.3 Potentially vulnerable (1.8.3-r4)

unbound-doc

1.8.3 Potentially vulnerable (1.8.3-r4)

unbound-libs

1.8.3 Potentially vulnerable (1.8.3-r4)

unbound-migrate

1.8.3 Potentially vulnerable (1.8.3-r4)

py-unbound

1.9.1 Potentially vulnerable (1.9.1-r8)

unbound

1.9.1 Potentially vulnerable (1.9.1-r8)

unbound-dbg

1.9.1 Potentially vulnerable (1.9.1-r8)

unbound-dev

1.9.1 Potentially vulnerable (1.9.1-r8)

unbound-doc

1.9.1 Potentially vulnerable (1.9.1-r8)

unbound-libs

1.9.1 Potentially vulnerable (1.9.1-r8)

unbound-migrate

1.9.1 Potentially vulnerable (1.9.1-r8)

unbound-openrc

1.9.1 Potentially vulnerable (1.9.1-r8)

py-unbound

1.9.6 Potentially vulnerable (1.9.6-r1)

unbound

1.9.6 Potentially vulnerable (1.9.6-r1)

unbound-dbg

1.9.6 Potentially vulnerable (1.9.6-r1)

unbound-dev

1.9.6 Potentially vulnerable (1.9.6-r1)

unbound-doc

1.9.6 Potentially vulnerable (1.9.6-r1)

unbound-libs

1.9.6 Potentially vulnerable (1.9.6-r1)

unbound-migrate

1.9.6 Potentially vulnerable (1.9.6-r1)

unbound-openrc

1.9.6 Potentially vulnerable (1.9.6-r1)

py-unbound

1.10.1 Potentially vulnerable (1.10.1-r0)

unbound

1.10.1 Potentially vulnerable (1.10.1-r0)

unbound-dbg

1.10.1 Potentially vulnerable (1.10.1-r0)

unbound-dev

1.10.1 Potentially vulnerable (1.10.1-r0)

unbound-doc

1.10.1 Potentially vulnerable (1.10.1-r0)

unbound-libs

1.10.1 Potentially vulnerable (1.10.1-r0)

unbound-migrate

1.10.1 Potentially vulnerable (1.10.1-r0)

unbound-openrc

1.10.1 Potentially vulnerable (1.10.1-r0)

py-unbound

1.13.0 (1.13.0-r3)

unbound

1.13.0 (1.13.0-r3)

unbound-dbg

1.13.0 (1.13.0-r3)

unbound-dev

1.13.0 (1.13.0-r3)

unbound-doc

1.13.0 (1.13.0-r3)

unbound-libs

1.13.0 (1.13.0-r3)

unbound-migrate

1.13.0 (1.13.0-r3)

unbound-openrc

1.13.0 (1.13.0-r3)

unbound

1.13.0 (1.13.0-alt1)

unbound

1.13.0 (1.13.0-alt1)

unbound

1.6.6 Potentially vulnerable (1.6.6-1.4.amzn1)

unbound

1.6.6 Potentially vulnerable (1.6.6-1.5.amzn1)

unbound

1.4.20 Potentially vulnerable (1.4.20-23.3.amzn1)

unbound

1.6.6 Potentially vulnerable (1.6.6-5.amzn2)
  • Summary:
    Validating, recursive, and caching DNS(SEC) resolver
  • Category:
    • System Environment/Daemons
  • License:
    • BSD
  • Homepage:

unbound

1.6.6 Potentially vulnerable (1.6.6-1.amzn2.0.3)
  • Summary:
    Validating, recursive, and caching DNS(SEC) resolver
  • Category:
    • System Environment/Daemons
  • License:
    • BSD
  • Homepage:

unbound

1.6.6 Potentially vulnerable (1.6.6-1.amzn2.0.2)
  • Summary:
    Validating, recursive, and caching DNS(SEC) resolver
  • Category:
    • System Environment/Daemons
  • License:
    • BSD
  • Homepage:

unbound

1.4.20 Potentially vulnerable (1.4.20-34.amzn2)

unbound

1.9.5 Potentially vulnerable (1.9.5-4)
Apertis v2020
v2020/development

unbound

1.9.0 Potentially vulnerable (1.9.0-2+deb10u1co1)
Apertis v2020
v2020-updates/development

unbound

1.9.0 Potentially vulnerable (1.9.0-2+deb10u2)
Apertis v2021 Development
v2021dev3/development

unbound

1.9.0 Potentially vulnerable (1.9.0-2+deb10u2)
Arch
community

unbound

1.13.0 (1.13.0-1)

python-unbound

1.10.1 Potentially vulnerable (1.10.1-1)

python2-unbound

1.6.0 Potentially vulnerable (1.6.0-1)

unbound

1.6.0 Potentially vulnerable (1.6.0-3+deb9u2)

unbound

1.6.0 Potentially vulnerable (1.6.0-3+deb9u2)

unbound

1.13.0

unbound

1.4.20 Potentially vulnerable (1.4.20-23.el6_9.4)
CentOS 6
updates

unbound

1.4.20 Potentially vulnerable (1.4.20-26.el6_10.1)
CentOS 6
updates

unbound

1.4.20 Potentially vulnerable (1.4.20-29.el6_10.1)

unbound

1.6.6 Potentially vulnerable (1.6.6-5.el7_8)
CentOS 8
AppStream

unbound

1.7.3 Potentially vulnerable (1.7.3-10.el8)
CentOS 8
AppStream

unbound

1.7.3 Potentially vulnerable (1.7.3-11.el8_2)

libunbound

1.9.2 Potentially vulnerable

unbound

1.9.2 Potentially vulnerable

libunbound

1.12.0 Potentially vulnerable

unbound

1.13.0

libunbound

1.13.0

unbound

1.13.0

libunbound-common

1.6.2 Potentially vulnerable (1.6.2-1)

libunbound-devel

1.6.2 Potentially vulnerable (1.6.2-1)

libunbound2

1.6.2 Potentially vulnerable (1.6.2-1)

python2-unbound

1.6.2 Potentially vulnerable (1.6.2-1)

python3-unbound

1.6.2 Potentially vulnerable (1.6.2-1)

unbound

1.6.2 Potentially vulnerable (1.6.2-1)

unbound-debuginfo

1.6.2 Potentially vulnerable (1.6.2-1)
Deepin
main

unbound

1.9.0.1 Potentially vulnerable (1.9.0.1-1+dde)

unbound

1.4.22 Potentially vulnerable (1.4.22-3+deb8u3)

unbound

1.6.0 Potentially vulnerable (1.6.0-3+deb9u2)

unbound

1.9.0 Potentially vulnerable (1.9.0-2+deb10u2)
Devuan 4.0 (Chimaera)
chimaera/main

unbound

1.13.0 (1.13.0-1)
Devuan Unstable
unstable/main

unbound

1.13.0 (1.13.0-1)

dns/unbound

1.12.0 Potentially vulnerable
Entware
x64-k3.2

libunbound

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
mipssf-k3.4

libunbound

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
armv7sf-k2.6

libunbound

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
mipselsf-k3.4

libunbound

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
aarch64-k3.10

libunbound

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
armv5sf-k3.2

libunbound

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
armv7sf-k3.2

libunbound

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
mipssf-k3.4

unbound-anchor

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
x64-k3.2

unbound-anchor

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
armv7sf-k2.6

unbound-anchor

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
mipselsf-k3.4

unbound-anchor

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
aarch64-k3.10

unbound-anchor

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
armv5sf-k3.2

unbound-anchor

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
armv7sf-k3.2

unbound-anchor

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
mipssf-k3.4

unbound-checkconf

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
x64-k3.2

unbound-checkconf

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
armv7sf-k2.6

unbound-checkconf

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
aarch64-k3.10

unbound-checkconf

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
armv5sf-k3.2

unbound-checkconf

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
armv7sf-k3.2

unbound-checkconf

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
mipselsf-k3.4

unbound-checkconf

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
mipssf-k3.4

unbound-control

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
x64-k3.2

unbound-control

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
aarch64-k3.10

unbound-control

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
armv5sf-k3.2

unbound-control

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
armv7sf-k2.6

unbound-control

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
armv7sf-k3.2

unbound-control

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
mipselsf-k3.4

unbound-control

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
mipssf-k3.4

unbound-control-setup

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
x64-k3.2

unbound-control-setup

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
mipselsf-k3.4

unbound-control-setup

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
aarch64-k3.10

unbound-control-setup

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
armv5sf-k3.2

unbound-control-setup

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
armv7sf-k2.6

unbound-control-setup

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
armv7sf-k3.2

unbound-control-setup

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
mipssf-k3.4

unbound-daemon

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
x64-k3.2

unbound-daemon

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
mipselsf-k3.4

unbound-daemon

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
aarch64-k3.10

unbound-daemon

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
armv5sf-k3.2

unbound-daemon

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
armv7sf-k2.6

unbound-daemon

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
armv7sf-k3.2

unbound-daemon

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
mipssf-k3.4

unbound-host

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
x64-k3.2

unbound-host

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
aarch64-k3.10

unbound-host

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
armv5sf-k3.2

unbound-host

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
armv7sf-k2.6

unbound-host

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
armv7sf-k3.2

unbound-host

1.12.0 Potentially vulnerable (1.12.0-1)
Entware
mipselsf-k3.4

unbound-host

1.12.0 Potentially vulnerable (1.12.0-1)
Exherbo
cogitri

net-dns/unbound

1.13.0
Fedora 26
updates

unbound

1.7.0 Potentially vulnerable (1.7.0-2.fc26)
Fedora 26
release

unbound

1.6.3 Potentially vulnerable (1.6.3-1.fc26)
Fedora 27
updates

unbound

1.7.3 Potentially vulnerable (1.7.3-10.fc27)
Fedora 27
release

unbound

1.6.6 Potentially vulnerable (1.6.6-2.fc27)
Fedora 28
updates

unbound

1.7.3 Potentially vulnerable (1.7.3-10.fc28)
Fedora 28
release

unbound

1.7.0 Potentially vulnerable (1.7.0-4.fc28)
Fedora 29
updates

unbound

1.8.3 Potentially vulnerable (1.8.3-2.fc29)
Fedora 29
release

unbound

1.7.3 Potentially vulnerable (1.7.3-9.fc29)
Fedora 30
updates

unbound

1.9.6 Potentially vulnerable (1.9.6-1.fc30)
Fedora 30
release

unbound

1.8.3 Potentially vulnerable (1.8.3-4.fc30)
Fedora 31
updates

unbound

1.10.1 Potentially vulnerable (1.10.1-1.fc31)
Fedora 31
release

unbound

1.9.3 Potentially vulnerable (1.9.3-1.fc31)
Fedora 32
updates

unbound

1.10.1 Potentially vulnerable (1.10.1-1.fc32)
Fedora 32
release

unbound

1.9.6 Potentially vulnerable (1.9.6-2.fc32)
Fedora 33
release

unbound

1.10.1 Potentially vulnerable (1.10.1-4.fc33)

unbound

1.10.1 Potentially vulnerable (1.10.1-5.fc34)

dns/unbound

1.13.0 (1.13.0_1)
Funtoo 1.4
net-kit

net-dns/unbound

1.12.0 Potentially vulnerable

net-dns/unbound

1.13.0

net-dns/unbound

1.13.0 (1.13.0-r1)

unbound

1.13.0

Unbound

1.5.9 Potentially vulnerable

unbound

1.13.0
HP-UX 11.31
ia64_64

unbound

1.13.0
HP-UX 11.31
ia64_64

unbound

1.12.0 Potentially vulnerable
HP-UX 11.31
hppa_32

unbound

1.12.0 Potentially vulnerable
HP-UX 11.31
hppa_32

unbound

1.4.21 Potentially vulnerable
Hyperbola
community

unbound

1.6.5 Potentially vulnerable (1.6.5-1.hyperbola6)

unbound

1.13.0 (1.13.0-1)

unbound

1.9.1 Potentially vulnerable

unbound

1.12.0 Potentially vulnerable

net-dns/unbound

1.12.0 Potentially vulnerable (1.12.0-r1)

net-dns/unbound

1.12.0 Potentially vulnerable

net-dns/unbound

1.11.0 Potentially vulnerable

net-dns/unbound

1.10.1 Potentially vulnerable (1.10.1-r1)

net-dns/unbound

1.12.0 Potentially vulnerable

net-dns/unbound

1.12.0 Potentially vulnerable (1.12.0-r1)

net-dns/unbound

1.11.0 Potentially vulnerable

net-dns/unbound

1.10.1 Potentially vulnerable (1.10.1-r1)

unbound

1.13.0

unbound

1.13.0
Mageia 6
core/updates

unbound

1.6.8 Potentially vulnerable (1.6.8-1.mga6)
Mageia 6
core/release

unbound

1.6.2 Potentially vulnerable (1.6.2-1.mga6)
Mageia 7
core/updates

unbound

1.10.1 Potentially vulnerable (1.10.1-1.mga7)
Mageia 7
core/updates

unbound

1.9.6 Potentially vulnerable (1.9.6-1.mga7)
Mageia 7
core/updates

unbound

1.9.5 Potentially vulnerable (1.9.5-1.mga7)
Mageia 7
core/updates

unbound

1.9.4 Potentially vulnerable (1.9.4-1.mga7)
Mageia 7
core/release

unbound

1.9.1 Potentially vulnerable (1.9.1-1.mga7)
Mageia 7
core/updates

unbound

1.9.1 Potentially vulnerable (1.9.1-1.1.mga7)
Mageia Cauldron
core/release

unbound

1.13.0 (1.13.0-2.mga8)
Manjaro Stable
community

unbound

1.13.0 (1.13.0-1)
Manjaro Testing
community

unbound

1.13.0 (1.13.0-1)

unbound

1.13.0 (1.13.0-1)

dns/unbound

1.5.8 Potentially vulnerable (1.5.8_1)

mingw-w64-i686-unbound

1.10.0 Potentially vulnerable (1.10.0-1)

mingw-w64-x86_64-unbound

1.10.0 Potentially vulnerable (1.10.0-1)

unbound

1.6.0 Potentially vulnerable (1.6.0-2mx15+1)

unbound

1.9.3 Potentially vulnerable (1.9.3-1~mx17+1)

unbound

1.9.3 Potentially vulnerable (1.9.3-1~mx19+1)

pyunbound

1.9.3 Potentially vulnerable

pyunbound

1.9.3 Potentially vulnerable

pyunbound

1.9.3 Potentially vulnerable

unbound

1.11.0 Potentially vulnerable

pyunbound

1.9.3 Potentially vulnerable

pyunbound

1.9.3 Potentially vulnerable

pyunbound

1.9.3 Potentially vulnerable

unbound

1.13.0

unbound

1.13.0

net/libunbound

1.13.0

unbound

1.7.3 Potentially vulnerable (1.7.3-14.oe1)

unbound

1.13.0

libunbound-devel-mini

1.5.10 Potentially vulnerable (1.5.10-3.1)
openSUSE Leap 42.3
updates/oss

libunbound-devel-mini

1.5.10 Potentially vulnerable (1.5.10-4.3.1)

unbound

1.5.10 Potentially vulnerable (1.5.10-3.1)
openSUSE Leap 42.3
updates/oss

unbound

1.5.10 Potentially vulnerable (1.5.10-4.3.1)

libunbound-devel-mini

1.6.8 Potentially vulnerable (1.6.8-lp150.1.3)
openSUSE Leap 15.0
updates/oss

libunbound-devel-mini

1.6.8 Potentially vulnerable (1.6.8-lp150.2.3.1)
openSUSE Leap 15.0
updates/oss

libunbound-devel-mini

1.6.8 Potentially vulnerable (1.6.8-lp150.2.6.1)

unbound

1.6.8 Potentially vulnerable (1.6.8-lp150.1.4)

libunbound-devel-mini

1.6.8 Potentially vulnerable (1.6.8-lp151.7.1)
openSUSE Leap 15.1
updates/oss

libunbound-devel-mini

1.6.8 Potentially vulnerable (1.6.8-lp151.8.3.1)

unbound

1.6.8 Potentially vulnerable (1.6.8-lp151.7.1)
openSUSE Leap 15.1
updates/oss

unbound

1.6.8 Potentially vulnerable (1.6.8-lp151.8.3.1)

libunbound-devel-mini

1.6.8 Potentially vulnerable (1.6.8-lp152.8.7)
openSUSE Leap 15.2
updates/oss

libunbound-devel-mini

1.6.8 Potentially vulnerable (1.6.8-lp152.9.3.1)

unbound

1.6.8 Potentially vulnerable (1.6.8-lp152.8.9)
openSUSE Leap 15.2
updates/oss

unbound

1.6.8 Potentially vulnerable (1.6.8-lp152.9.3.1)

libunbound-devel-mini

1.13.0 (1.13.0-1.1)

unbound

1.13.0 (1.13.0-1.1)

libunbound

1.6.8 Potentially vulnerable (1.6.8-3)

unbound

1.6.8 Potentially vulnerable (1.6.8-3)

unbound-anchor

1.6.8 Potentially vulnerable (1.6.8-3)

unbound-control

1.6.8 Potentially vulnerable (1.6.8-3)

unbound-control-setup

1.6.8 Potentially vulnerable (1.6.8-3)

unbound-host

1.6.8 Potentially vulnerable (1.6.8-3)

libunbound

1.10.1 Potentially vulnerable (1.10.1-1)

unbound

1.10.1 Potentially vulnerable (1.10.1-1)

unbound-anchor

1.10.1 Potentially vulnerable (1.10.1-1)

unbound-control

1.10.1 Potentially vulnerable (1.10.1-1)

unbound-control-setup

1.10.1 Potentially vulnerable (1.10.1-1)

unbound-host

1.10.1 Potentially vulnerable (1.10.1-1)

libunbound-heavy

1.11.0 Potentially vulnerable (1.11.0-2)

libunbound-light

1.11.0 Potentially vulnerable (1.11.0-2)

unbound-anchor

1.11.0 Potentially vulnerable (1.11.0-2)

unbound-checkconf

1.11.0 Potentially vulnerable (1.11.0-2)

unbound-control

1.11.0 Potentially vulnerable (1.11.0-2)

unbound-control-setup

1.11.0 Potentially vulnerable (1.11.0-2)

unbound-daemon

1.11.0 Potentially vulnerable (1.11.0-2)

unbound-daemon-heavy

1.11.0 Potentially vulnerable (1.11.0-2)

unbound-host

1.11.0 Potentially vulnerable (1.11.0-2)
Parabola
community

unbound

1.13.0 (1.13.0-1)

unbound

1.6.0 Potentially vulnerable (1.6.0-3+deb9u2)

unbound

1.9.0 Potentially vulnerable (1.9.0-2+deb10u2)

unbound

1.9.0 Potentially vulnerable (1.9.0-2+deb10u1)

unbound

1.9.0 Potentially vulnerable (1.9.0-2)
Pardus 19
updates/main

unbound

1.9.0 Potentially vulnerable (1.9.0-2+deb10u2)
Pardus 19
updates/main

unbound

1.9.0 Potentially vulnerable (1.9.0-2+deb10u1)
Parrot
main

unbound

1.13.0 (1.13.0-1)

unbound

1.13.0 (1.13.0-1pclos2020)
  • Summary:
    A validating, recursive, and caching DNS resolver
  • Category:
    • Networking/Other

net/unbound

1.13.0

unbound

1.12.0 Potentially vulnerable (1.12.0-1)

unbound

1.9.0 Potentially vulnerable (1.9.0-2+deb10u2)

unbound

1.13.0 (1.13.0-1)

unbound

1.6.0 Potentially vulnerable (1.6.0-3+deb9u2)

unbound

1.9.0 Potentially vulnerable (1.9.0-2+deb10u2)

unbound

1.13.0 (1.13.0-1)
Rosa 2014.1
contrib/updates

unbound

1.5.10 Potentially vulnerable (1.5.10-1)
Rosa 2014.1
contrib/release

unbound

1.4.17 Potentially vulnerable (1.4.17-2)
Rosa 2016.1
main/testing

unbound

1.12.0 Potentially vulnerable (1.12.0-1)
Rosa 2016.1
main/updates

unbound

1.12.0 Potentially vulnerable (1.12.0-1)
Rosa 2016.1
main/release

unbound

1.5.10 Potentially vulnerable (1.5.10-2)
Rosa 2019.1
main/release

unbound

1.12.0 Potentially vulnerable (1.12.0-1)
Rosa Server 6.9
base/release

unbound

1.4.20 Potentially vulnerable (1.4.20-23.res6.3)
Rosa Server 6.9
base/updates

unbound

1.4.20 Potentially vulnerable (1.4.20-23.res6.4)
Rosa Server 7.3
base/release

unbound

1.4.20 Potentially vulnerable (1.4.20-28.res7)
Rosa Server 7.5
base/release

unbound

1.6.6 Potentially vulnerable (1.6.6-1.res7)
Rosa Server 7.5
base/release

unbound

1.4.20 Potentially vulnerable (1.4.20-28.res7)

unbound

1.6.6 Potentially vulnerable (1.6.6-1.el7)
  • Summary:
    Validating, recursive, and caching DNS(SEC) resolver
  • Category:
    • System Environment/Daemons
  • License:
    • BSD
  • Homepage:

unbound

1.6.6 Potentially vulnerable (1.6.6-3.el7)
  • Summary:
    Validating, recursive, and caching DNS(SEC) resolver
  • Category:
    • System Environment/Daemons
  • License:
    • BSD
  • Homepage:

unbound

1.6.6 Potentially vulnerable (1.6.6-4.el7_8)
  • Summary:
    Validating, recursive, and caching DNS(SEC) resolver
  • Category:
    • System Environment/Daemons
  • License:
    • BSD
  • Homepage:

unbound

1.6.6 Potentially vulnerable (1.6.6-5.el7_8)
  • Summary:
    Validating, recursive, and caching DNS(SEC) resolver
  • Category:
    • System Environment/Daemons
  • License:
    • BSD
  • Homepage:

unbound

1.4.20 Potentially vulnerable (1.4.20-17.el7)

unbound

1.4.20 Potentially vulnerable (1.4.20-19.el7)

unbound

1.4.20 Potentially vulnerable (1.4.20-26.el7)

unbound

1.4.20 Potentially vulnerable (1.4.20-28.el7)

unbound

1.4.20 Potentially vulnerable (1.4.20-34.el7)

unbound

1.10.1 Potentially vulnerable

unbound-dev

1.10.1 Potentially vulnerable

unbound

1.7.3 Potentially vulnerable

unbound-dev

1.7.3 Potentially vulnerable

unbound

1.10.1 Potentially vulnerable

unbound-dbginfo

1.10.1 Potentially vulnerable

unbound-devel

1.10.1 Potentially vulnerable
Trisquel 6.0
toutatis/main

unbound

1.4.16 Potentially vulnerable (1.4.16-1)
Trisquel 6.0 backports
toutatis-backports/main

unbound

1.4.18 Potentially vulnerable (1.4.18-1~ubuntu12.04.1)
Trisquel 7.0
belenos/main

unbound

1.4.22 Potentially vulnerable (1.4.22-1ubuntu4)
Trisquel 7.0
belenos-updates/main

unbound

1.4.22 Potentially vulnerable (1.4.22-1ubuntu4.14.04.3)
Trisquel 8.0
flidas-updates/main

unbound

1.6.7 Potentially vulnerable (1.6.7-1ubuntu2+8.0trisquel1)
Trisquel 8.0
flidas/main

unbound

1.5.8 Potentially vulnerable (1.5.8-1ubuntu1)
Trisquel 9.0
etiona/main

unbound

1.6.7 Potentially vulnerable (1.6.7-1ubuntu2)
Trisquel 9.0
etiona-updates/main

unbound

1.6.7 Potentially vulnerable (1.6.7-1ubuntu2.3)
Ubuntu 12.04
precise/universe

unbound

1.4.16 Potentially vulnerable (1.4.16-1)
Ubuntu 12.04 Backports
precise-backports/universe

unbound

1.4.18 Potentially vulnerable (1.4.18-1~ubuntu12.04.1)

libunbound

1.13.0 (1.13.0_1)

unbound

1.13.0 (1.13.0_1)

unbound-devel

1.13.0 (1.13.0_1)

Unbound

1.13.0