Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-w7hs-jqc1-qqa9
Summarybind: A malformed request can trigger an assertion failure in badcache.c
Aliases
0
alias CVE-2018-5734
Fixed_packages
0
url pkg:deb/debian/bind9@0?distro=trixie
purl pkg:deb/debian/bind9@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@0%3Fdistro=trixie
1
url pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
purl pkg:deb/debian/bind9@1:9.16.50-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
1
vulnerability VCID-gdhz-6yzf-afda
2
vulnerability VCID-unqt-mcxv-c7fw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2%3Fdistro=trixie
2
url pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.18.41-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d9np-47r3-rkg1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.18-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.18-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.21-1%3Fdistro=trixie
5
url pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
purl pkg:deb/debian/bind9@1:9.20.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.20.22-1%3Fdistro=trixie
Affected_packages
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5734.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5734.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5734
reference_id
reference_type
scores
0
value 0.05241
scoring_system epss
scoring_elements 0.89988
published_at 2026-04-18T12:55:00Z
1
value 0.05241
scoring_system epss
scoring_elements 0.89987
published_at 2026-04-16T12:55:00Z
2
value 0.06399
scoring_system epss
scoring_elements 0.9098
published_at 2026-04-01T12:55:00Z
3
value 0.06399
scoring_system epss
scoring_elements 0.90985
published_at 2026-04-02T12:55:00Z
4
value 0.06399
scoring_system epss
scoring_elements 0.90994
published_at 2026-04-04T12:55:00Z
5
value 0.06399
scoring_system epss
scoring_elements 0.91004
published_at 2026-04-07T12:55:00Z
6
value 0.06399
scoring_system epss
scoring_elements 0.91017
published_at 2026-04-08T12:55:00Z
7
value 0.06399
scoring_system epss
scoring_elements 0.91022
published_at 2026-04-09T12:55:00Z
8
value 0.06399
scoring_system epss
scoring_elements 0.91031
published_at 2026-04-12T12:55:00Z
9
value 0.06399
scoring_system epss
scoring_elements 0.9103
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5734
2
reference_url https://kb.isc.org/docs/aa-01562
reference_id
reference_type
scores
url https://kb.isc.org/docs/aa-01562
3
reference_url https://security.netapp.com/advisory/ntap-20180926-0005/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20180926-0005/
4
reference_url http://www.securityfocus.com/bid/103189
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/103189
5
reference_url http://www.securitytracker.com/id/1040438
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1040438
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1550602
reference_id 1550602
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1550602
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:s1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.5:s1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:s1:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:s4:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.5:s4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.5:s4:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.6:s1:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.6:s1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.6:s1:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.6:s2:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.10.6:s2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.10.6:s2:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire_element_os_management_node:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:solidfire_element_os_management_node:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire_element_os_management_node:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-5734
reference_id CVE-2018-5734
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-5734
Weaknesses
0
cwe_id 617
name Reachable Assertion
description The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.
Exploits
Severity_range_score5.0 - 7.5
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-w7hs-jqc1-qqa9