Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
bind Vendor: isc

About This Product

bind is a software product offered by isc. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 174 known vulnerabilities affecting isc bind. This includes 91 high-severity issues requiring prompt remediation. Vulnerabilities in this product have been disclosed spanning from 1997 to 2024, indicating a sustained research interest and ongoing security attention. 77 medium-severity issues and 6 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-1999-0184 1997-07-01 2025-04-03 - 6.4 Likely
CVE-1999-0024 1997-08-13 2025-04-03 - 5.0 Likely
CVE-1999-0009 1998-04-08 2025-04-03 - 10.0 Likely
CVE-1999-0010 1998-04-08 2025-04-03 - 5.0 Likely
CVE-1999-0011 1998-04-08 2025-04-09 5.4 10.0 Likely
CVE-1999-1499 1998-04-10 2025-04-03 - 2.1 Unknown
CVE-1999-0833 1999-11-10 2025-04-03 - 7.5 Likely
CVE-1999-0837 1999-11-10 2025-04-03 - 10.0 Likely
CVE-1999-0848 1999-11-10 2025-04-03 - 5.0 Likely
CVE-1999-0849 1999-11-10 2025-04-03 - 5.0 Likely
CVE-2000-0335 2000-05-03 2025-04-03 - 7.5 Likely
CVE-2000-1029 2000-12-11 2025-04-03 - 10.0 Likely
CVE-2000-0887 2000-12-19 2025-04-03 - 5.0 Likely
CVE-2000-0888 2000-12-19 2025-04-03 - 5.0 Likely
CVE-2001-0010 2001-02-12 2025-04-03 - 10.0 Likely
CVE-2001-0011 2001-02-12 2025-04-03 - 10.0 Likely
CVE-2001-0012 2001-02-12 2025-04-03 - 5.0 Likely
CVE-2001-0013 2001-02-12 2025-04-03 - 10.0 Likely
CVE-2001-0497 2001-07-21 2025-04-03 7.8 4.6 Unknown
CVE-2002-0400 2002-06-18 2025-04-03 - 5.0 Likely
CVE-2002-0651 2002-07-03 2025-04-03 - 7.5 Likely
CVE-2002-0684 2002-08-12 2025-04-03 - 7.5 Likely
CVE-2002-0029 2002-11-29 2025-04-03 - 7.5 Likely
CVE-2002-1219 2002-11-29 2025-04-03 - 7.5 Likely
CVE-2002-1220 2002-11-29 2025-04-03 - 5.0 Likely
CVE-2002-1221 2002-11-29 2025-04-03 - 5.0 Likely
CVE-2002-2211 2002-12-31 2025-04-03 - 5.0 Likely
CVE-2002-2212 2002-12-31 2025-04-03 - 5.0 Likely
CVE-2002-2213 2002-12-31 2025-04-03 - 5.0 Likely
CVE-2003-0914 2003-12-15 2025-04-03 - 4.3 Likely
CVE-2005-0033 2005-05-02 2025-04-03 - 5.0 Likely
CVE-2005-0034 2005-05-02 2025-04-03 - 4.3 Likely
CVE-2006-0527 2006-02-02 2025-04-03 - 7.5 Likely
CVE-2006-0987 2006-03-03 2025-04-03 - 5.0 Likely
CVE-2006-2073 2006-04-27 2025-04-03 - 5.0 Likely
CVE-2006-4095 2006-09-06 2025-04-03 7.5 5.0 Likely
CVE-2006-4096 2006-09-06 2025-04-03 - 5.0 Likely
CVE-2007-0493 2007-01-25 2025-04-09 - 7.8 Likely
CVE-2007-0494 2007-01-25 2025-04-09 - 4.3 Likely
CVE-2007-2241 2007-05-02 2025-04-09 - 7.1 Likely
CVE-2007-2925 2007-07-24 2025-04-09 - 5.8 Likely
CVE-2007-2926 2007-07-24 2025-04-09 - 4.3 Likely
CVE-2007-2930 2007-09-12 2025-04-09 - 4.3 Likely
CVE-2008-0122 2008-01-16 2025-04-09 - 10.0 Likely
CVE-2008-1447 2008-07-08 2025-04-09 6.8 5.0 Likely
CVE-2008-4163 2008-09-22 2025-04-09 - 7.8 Likely
CVE-2009-0025 2009-01-07 2025-04-09 - 6.8 Likely
CVE-2009-0265 2009-01-26 2025-04-09 7.5 5.0 Likely
CVE-2009-0696 2009-07-29 2025-12-23 - 4.3 Likely
CVE-2009-4022 2009-11-25 2025-04-09 - 2.6 Unknown
CVE-2010-0097 2010-01-22 2025-04-11 - 4.3 Likely
CVE-2010-0290 2010-01-22 2025-04-11 - 4.0 Unknown
CVE-2010-0382 2010-01-22 2025-04-11 - 7.6 Unknown
CVE-2010-0213 2010-07-28 2025-04-11 - 2.6 Unknown
CVE-2010-0218 2010-10-05 2025-04-11 - 5.0 Likely
CVE-2010-3762 2010-10-05 2025-04-11 - 4.3 Likely
CVE-2010-3613 2010-12-06 2025-04-11 - 4.0 Likely
CVE-2010-3614 2010-12-06 2025-04-11 - 6.4 Likely
CVE-2010-3615 2010-12-06 2025-04-11 - 5.0 Likely
CVE-2011-0414 2011-02-23 2025-04-11 - 7.1 Likely
CVE-2011-1907 2011-05-09 2025-04-11 - 5.0 Likely
CVE-2011-1910 2011-05-31 2025-04-11 - 5.0 Likely
CVE-2011-2464 2011-07-08 2025-04-11 - 5.0 Likely
CVE-2011-2465 2011-07-08 2025-04-11 - 2.6 Unknown
CVE-2011-4313 2011-11-29 2025-04-11 - 5.0 Likely
CVE-2012-1033 2012-02-08 2025-04-11 - 5.0 Likely
CVE-2012-1667 2012-06-05 2025-04-11 - 8.5 Likely
CVE-2012-3817 2012-07-25 2025-04-11 - 7.8 Likely
CVE-2012-3868 2012-07-25 2025-04-11 - 4.3 Likely
CVE-2012-4244 2012-09-14 2025-04-11 - 7.8 Likely
CVE-2012-5166 2012-10-10 2025-04-11 - 7.8 Likely
CVE-2012-5688 2012-12-06 2025-04-11 - 7.8 Likely
CVE-2012-5689 2013-01-25 2025-04-11 - 7.1 Likely
CVE-2013-2266 2013-03-28 2025-04-11 - 7.8 Likely
CVE-2013-3919 2013-06-06 2025-04-11 - 7.8 Likely
CVE-2013-4854 2013-07-29 2025-04-11 - 7.8 Likely
CVE-2013-6230 2013-11-08 2025-04-11 - 6.8 Likely
CVE-2014-0591 2014-01-14 2025-04-11 - 2.6 Unknown
CVE-2014-3214 2014-05-09 2025-04-12 - 5.0 Likely
CVE-2014-3859 2014-06-13 2025-04-12 - 5.0 Likely
CVE-2014-8500 2014-12-11 2025-04-12 - 7.8 Likely
CVE-2014-8680 2014-12-11 2025-04-12 - 5.4 Unknown
CVE-2015-1349 2015-02-19 2025-04-12 - 5.4 Unknown
CVE-2015-4620 2015-07-08 2025-04-12 - 7.8 Likely
CVE-2015-5477 2015-07-29 2025-04-12 - 7.8 Likely
CVE-2015-5722 2015-09-05 2025-04-12 - 7.8 Likely
CVE-2015-5986 2015-09-05 2025-04-12 - 7.1 Likely
CVE-2015-8000 2015-12-16 2025-04-12 - 5.0 Likely
CVE-2015-8461 2015-12-16 2025-04-12 - 7.1 Likely
CVE-2015-8704 2016-01-20 2025-04-12 6.5 6.8 Likely
CVE-2015-8705 2016-01-20 2025-04-12 7.0 6.6 Unknown
CVE-2016-1284 2016-02-04 2025-04-12 5.9 2.6 Unknown
CVE-2016-1285 2016-03-09 2025-04-12 6.8 4.3 Likely
CVE-2016-1286 2016-03-09 2025-04-12 8.6 5.0 Likely
CVE-2016-2088 2016-03-09 2025-04-12 6.8 4.3 Likely
CVE-2016-6170 2016-07-06 2025-04-12 6.5 4.0 Likely
CVE-2016-2775 2016-07-19 2025-04-12 5.9 4.3 Likely
CVE-2016-2776 2016-09-28 2025-04-12 7.5 7.8 Likely
CVE-2016-2848 2016-10-21 2025-04-12 7.5 5.0 Likely
CVE-2016-8864 2016-11-02 2025-04-12 7.5 5.0 Likely
CVE-2016-9131 2017-01-12 2025-04-20 7.5 5.0 Likely
CVE-2016-9147 2017-01-12 2025-04-20 7.5 5.0 Likely
CVE-2016-9444 2017-01-12 2025-04-20 7.5 5.0 Likely
CVE-2016-9778 2019-01-16 2024-11-21 7.5 4.3 Likely
CVE-2017-3135 2019-01-16 2024-11-21 7.5 4.3 Likely
CVE-2017-3136 2019-01-16 2024-11-21 5.9 4.3 Likely
CVE-2017-3137 2019-01-16 2024-11-21 7.5 5.0 Likely
CVE-2017-3138 2019-01-16 2024-11-21 6.5 3.5 Unknown
CVE-2017-3140 2019-01-16 2024-11-21 3.7 4.3 Likely
CVE-2017-3141 2019-01-16 2024-11-21 7.2 7.2 Unknown
CVE-2017-3142 2019-01-16 2024-11-21 5.3 4.3 Likely
CVE-2017-3143 2019-01-16 2024-11-21 7.5 4.3 Likely
CVE-2017-3145 2019-01-16 2024-11-21 7.5 5.0 Likely
CVE-2018-5734 2019-01-16 2024-11-21 7.5 5.0 Likely
CVE-2018-5736 2019-01-16 2024-11-21 5.3 3.5 Unknown
CVE-2018-5737 2019-01-16 2024-11-21 5.9 5.0 Likely
CVE-2018-5738 2019-01-16 2024-11-21 5.3 5.0 Likely
CVE-2018-5740 2019-01-16 2024-11-21 7.5 5.0 Likely
CVE-2018-5741 2019-01-16 2024-11-21 6.5 4.0 Likely
CVE-2018-5743 2019-10-09 2024-11-21 7.5 4.3 Likely
CVE-2018-5744 2019-10-09 2024-11-21 7.5 5.0 Likely
CVE-2018-5745 2019-10-09 2024-11-21 4.9 3.5 Unknown
CVE-2019-6465 2019-10-09 2024-11-21 5.3 4.3 Likely
CVE-2019-6467 2019-10-09 2024-11-21 7.5 5.0 Likely
CVE-2019-6468 2019-10-09 2024-11-21 7.5 5.0 Likely
CVE-2019-6469 2019-10-09 2024-11-21 7.5 4.3 Likely
CVE-2019-6471 2019-10-09 2024-11-21 5.9 4.3 Likely
CVE-2019-6475 2019-10-17 2024-11-21 5.9 5.0 Likely
CVE-2019-6476 2019-10-17 2024-11-21 5.9 5.0 Likely
CVE-2018-5742 2019-10-30 2024-11-21 7.5 4.3 Likely
CVE-2013-5661 2019-11-05 2024-11-21 5.9 2.6 Unknown
CVE-2019-6477 2019-11-26 2024-11-21 7.5 5.0 Likely
CVE-2020-8616 2020-05-19 2024-11-21 8.6 5.0 Likely
CVE-2020-8617 2020-05-19 2024-11-21 7.5 4.3 Likely
CVE-2020-8618 2020-06-17 2024-11-21 4.9 4.0 Likely
CVE-2020-8619 2020-06-17 2024-11-21 4.9 4.0 Likely
CVE-2020-8620 2020-08-21 2024-11-21 7.5 5.0 Likely
CVE-2020-8621 2020-08-21 2024-11-21 7.5 4.3 Likely
CVE-2020-8622 2020-08-21 2024-11-21 6.5 4.0 Likely
CVE-2020-8623 2020-08-21 2024-11-21 7.5 4.3 Likely
CVE-2020-8624 2020-08-21 2024-11-21 4.3 4.0 Likely
CVE-2020-8625 2021-02-17 2024-11-21 8.1 6.8 Likely
CVE-2021-25214 2021-04-29 2024-11-21 6.5 4.0 Likely
CVE-2021-25215 2021-04-29 2024-11-21 7.5 5.0 Likely
CVE-2021-25216 2021-04-29 2024-11-21 8.1 6.8 Likely
CVE-2021-25218 2021-08-18 2024-11-21 7.5 5.0 Likely
CVE-2021-25219 2021-10-27 2024-11-21 5.3 5.0 Likely
CVE-2022-0667 2022-03-22 2024-11-21 7.5 5.0 Likely
CVE-2022-0396 2022-03-23 2024-11-21 5.3 4.3 Likely
CVE-2022-0635 2022-03-23 2024-11-21 7.5 5.0 Likely
CVE-2021-25220 2022-03-23 2024-11-21 6.8 4.0 Likely
CVE-2022-1183 2022-05-19 2024-11-21 7.5 4.3 Likely
CVE-2022-2795 2022-09-21 2024-11-29 5.3 - -
CVE-2022-2881 2022-09-21 2025-05-28 5.5 - -
CVE-2022-2906 2022-09-21 2025-05-28 7.5 - -
CVE-2022-38177 2022-09-21 2025-05-28 7.5 - -
CVE-2022-38178 2022-09-21 2025-05-28 7.5 - -
CVE-2022-3080 2022-09-21 2024-11-21 7.5 - -
CVE-2022-3094 2023-01-26 2025-04-01 7.5 - -
CVE-2022-3488 2023-01-26 2025-04-01 7.5 - -
CVE-2022-3736 2023-01-26 2025-04-01 7.5 - -
CVE-2022-3924 2023-01-26 2025-03-31 7.5 - -
CVE-2023-2828 2023-06-21 2024-11-21 7.5 - -
CVE-2023-2829 2023-06-21 2024-11-21 7.5 - -
CVE-2023-2911 2023-06-21 2024-11-21 7.5 - -
CVE-2023-3341 2023-09-20 2025-12-02 7.5 - -
CVE-2023-4236 2023-09-20 2024-11-21 7.5 - -
CVE-2023-4408 2024-02-13 2025-03-14 7.5 - -
CVE-2023-5517 2024-02-13 2024-11-21 7.5 - -
CVE-2023-5679 2024-02-13 2025-03-29 7.5 - -
CVE-2023-5680 2024-02-13 2024-11-21 5.3 - -
CVE-2023-6516 2024-02-13 2024-11-21 7.5 - -
CVE-2023-50387 2024-02-14 2025-11-04 7.5 - -
CVE-2023-50868 2024-02-14 2025-12-23 7.5 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for isc bind by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.