Known Vulnerabilities for Bind by Isc

Listed below are 10 of the newest known vulnerabilities associated with "Bind" by "Isc".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2026-33619 PinchTab is a standalone HTTP server that gives AI agents direct control over a Chrome browser. PinchTab v0.8.3 contains a se... Not Provided 2026-03-26 2026-03-30
CVE-2026-32978 OpenClaw before 2026.3.11 contains an approval integrity vulnerability where system.run approvals fail to bind mutable file o... Not Provided 2026-03-29 2026-03-30
CVE-2022-0396 BIND 9.16.11 -> 9.16.26, 9.17.0 -> 9.18.0 and versions 9.16.11-S1 -> 9.16.26-S1 of the BIND Supported Preview Edition. Specif... 5.3 - MEDIUM 2022-03-23 2024-01-21
CVE-2021-25220 BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -> 9.11.36-S1 9.16.8-S1 ... 6.8 - MEDIUM 2022-03-23 2023-11-09
CVE-2021-25219 In BIND 9.3.0 -> 9.11.35, 9.12.0 -> 9.16.21, and versions 9.9.3-S1 -> 9.11.35-S1 and 9.16.8-S1 -> 9.16.21-S1 of BIND Supporte... 5.3 - MEDIUM 2021-10-27 2023-11-07
CVE-2021-25218 In BIND 9.16.19, 9.17.16. Also, version 9.16.19-S1 of BIND Supported Preview Edition When a vulnerable version of named recei... 7.5 - HIGH 2021-08-18 2023-11-07
CVE-2021-25216 In BIND 9.5.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.11.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Su... 9.8 - CRITICAL 2021-04-29 2022-05-03
CVE-2021-25215 In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Sup... 7.5 - HIGH 2021-04-29 2023-11-07
CVE-2021-25214 In BIND 9.8.5 -> 9.8.8, 9.9.3 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.1... 6.5 - MEDIUM 2021-04-29 2023-11-07
CVE-2020-8618 An attacker who is permitted to send zone data to a server via zone transfer can exploit this to intentionally trigger the as... 4.9 - MEDIUM 2020-06-17 2022-10-07

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationIscBind9.9.9AllAllAll
ApplicationIscBind9.9.9-AllAll
ApplicationIscBind9.9.9b1AllAll
ApplicationIscBind9.9.9b2AllAll
ApplicationIscBind9.9.9beta1AllAll
ApplicationIscBind9.9.9beta2AllAll
ApplicationIscBind9.9.9p1AllAll
ApplicationIscBind9.9.9p2AllAll
ApplicationIscBind9.9.9p3AllAll
ApplicationIscBind9.9.9p4AllAll
ApplicationIscBind9.9.9p5AllAll
ApplicationIscBind9.9.9p6AllAll
ApplicationIscBind9.9.9p8AllAll
ApplicationIscBind9.9.9rc1AllAll
ApplicationIscBind9.9.9s1AllAll
ApplicationIscBind9.9.9s1rc1AllAll
ApplicationIscBind9.9.9s6AllAll
ApplicationIscBind9.9.9s7AllAll
ApplicationIscBind9.9.9s8AllAll
ApplicationIscBind9.9.8AllAllAll
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report