CVE-2018-5390 Detail Current Description Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.

View Analysis Description Analysis Description Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service. Severity CVSS Version 3.x CVSS Version 2.0



CVSS 3.x Severity and Metrics:

NIST: NVD Base Score: 7.5 HIGH Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS 2.0 Severity and Metrics:



NIST: NVD Base Score: 7.8 HIGH Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:C) Weakness Enumeration CWE-ID CWE Name Source CWE-400 Uncontrolled Resource Consumption NIST CERT/CC Known Affected Software Configurations Switch to CPE 2.2 CPEs loading, please wait. Denotes Vulnerable Software

Are we missing a CPE here? Please let us know.

Change History 24 change records found show changes Modified Analysis 9/18/2020 12:14:19 PM Action Type Old Value New Value Removed CVSS V3 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H



Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H



Added CWE NIST CWE-400



Removed CWE NIST CWE-20



Changed Reference Type http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181031-02-linux-en No Types Assigned



http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181031-02-linux-en Third Party Advisory



Changed Reference Type http://www.openwall.com/lists/oss-security/2019/06/28/2 No Types Assigned



http://www.openwall.com/lists/oss-security/2019/06/28/2 Mailing List, Third Party Advisory



Changed Reference Type http://www.openwall.com/lists/oss-security/2019/07/06/3 No Types Assigned



http://www.openwall.com/lists/oss-security/2019/07/06/3 Mailing List, Third Party Advisory



Changed Reference Type http://www.openwall.com/lists/oss-security/2019/07/06/4 No Types Assigned



http://www.openwall.com/lists/oss-security/2019/07/06/4 Mailing List, Third Party Advisory



Changed Reference Type https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf No Types Assigned



https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf Third Party Advisory



Changed Reference Type https://support.f5.com/csp/article/K95343321?utm_source=f5support&utm_medium=RSS No Types Assigned



https://support.f5.com/csp/article/K95343321?utm_source=f5support&utm_medium=RSS Third Party Advisory



Changed Reference Type https://www.oracle.com/security-alerts/cpujul2020.html No Types Assigned



https://www.oracle.com/security-alerts/cpujul2020.html Third Party Advisory



CVE Modified by MITRE 7/14/2020 11:15:38 PM Action Type Old Value New Value Added Reference https://www.oracle.com/security-alerts/cpujul2020.html [No Types Assigned]



CVE Modified by MITRE 6/11/2020 1:15:11 AM Action Type Old Value New Value Added Reference http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181031-02-linux-en [No Types Assigned]



CVE Modified by MITRE 4/14/2020 9:15:12 AM Action Type Old Value New Value Added Reference https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf [No Types Assigned]



CVE Modified by MITRE 10/25/2019 2:15:10 PM Action Type Old Value New Value Added Reference https://support.f5.com/csp/article/K95343321?utm_source=f5support&utm_medium=RSS [No Types Assigned]



CVE Modified by MITRE 10/09/2019 7:41:17 PM Action Type Old Value New Value Added CWE CERT/CC CWE-400



CVE Modified by MITRE 7/06/2019 8:15:10 PM Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2019/07/06/3 [No Types Assigned]



Added Reference http://www.openwall.com/lists/oss-security/2019/07/06/4 [No Types Assigned]



CVE Modified by MITRE 6/28/2019 5:15:10 PM Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2019/06/28/2 [No Types Assigned]



Modified Analysis 3/11/2019 9:46:31 AM Action Type Old Value New Value Changed CPE Configuration Record truncated, showing 500 of 1156 characters.

View Entire Change Record

OR *cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_ Record truncated, showing 500 of 1363 characters.

View Entire Change Record

OR *cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_ Changed CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.9



OR *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.9 up to (excluding) 4.18 *cpe:2.3:o:linux:linux_kernel:4.18:rc1:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:4.18:rc2:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:4.18:rc3:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:4.18:rc4:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:4.18:rc5:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:4.18:rc6:*:*:*:*:*:*



Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2924 No Types Assigned



https://access.redhat.com/errata/RHSA-2018:2924 Third Party Advisory



Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2933 No Types Assigned



https://access.redhat.com/errata/RHSA-2018:2933 Third Party Advisory



Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2948 No Types Assigned



https://access.redhat.com/errata/RHSA-2018:2948 Third Party Advisory



Changed Reference Type https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 No Types Assigned



https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 Third Party Advisory



Changed Reference Type https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html No Types Assigned



https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html Patch, Third Party Advisory



CVE Modified by MITRE 1/16/2019 2:30:25 PM Action Type Old Value New Value Added Reference https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html [No Types Assigned]



CVE Modified by MITRE 11/30/2018 4:34:43 PM Action Type Old Value New Value Added Reference https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 [No Types Assigned]



CVE Modified by MITRE 10/31/2018 6:32:20 AM Action Type Old Value New Value Added Reference https://access.redhat.com/errata/RHSA-2018:2948 [No Types Assigned]



CVE Modified by MITRE 10/17/2018 6:30:39 AM Action Type Old Value New Value Added Reference https://access.redhat.com/errata/RHSA-2018:2924 [No Types Assigned]



Added Reference https://access.redhat.com/errata/RHSA-2018:2933 [No Types Assigned]



Initial Analysis 10/11/2018 9:7:17 AM Action Type Old Value New Value Added CPE Configuration AND OR *cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3:*:*:*:*:*:*:* *cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.1:*:*:*:*:*:*:* *cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.2:*:*:*:*:*:*:* *cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.3:*:*:*:*:*:*:* *cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.4:*:*:*:*:*:*:* OR cpe:2.3:h:cisco:telepresence_conductor:-:*:*:*:*:*:*:*



Added CPE Configuration Record truncated, showing 500 of 685 characters.

View Entire Change Record

AND OR *cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10:*:*:*:*:*:*:* *cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.1:*:*:*:*:*:*:* *cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.2:*:*:*:*:*:*:* *cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.3:*:*:*:*:*:*:* *cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.4:*:*:*:*:*:*:* Added CPE Configuration Record truncated, showing 500 of 895 characters.

View Entire Change Record

OR *cpe:2.3:a:cisco:collaboration_meeting_rooms:1.0:*:*:*:*:*:*:* *cpe:2.3:a:cisco:digital_network_architecture_center:1.2:*:*:*:*:*:*:* *cpe:2.3:a:cisco:expressway:x8.10:*:*:*:*:*:*:* *cpe:2.3:a:cisco:expressway:x8.10.1:*:*:*:*:*:*:* *cpe:2.3:a:cisco:expressway:x8.10.2:*:*:*:*:*:*:* *cpe:2.3:a:cisco:expressway:x8.10.3:*:*:*:*:*:*:* *cpe:2.3:a:cisco:expressway:x8.10.4:*:*:*:*:*:*:* *cpe:2.3:a:cisco:expressway:x8.11:*:*:*:*:*:*:* *cpe:2.3:a:cisco:expre Added CPE Configuration Record truncated, showing 500 of 5856 characters.

View Entire Change Record

OR *cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from (including) 11.5.1 up to (including) 11.6.3 *cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from (including) 12.1.0 up to (including) 12.1.3 *cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from (including) 13.0.0 up to (including) 13.1.1 *cpe:2.3:a:f5:big-ip_access_policy_manager:14.0.0:*:*:*:*:*:*:* *cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*: Added CPE Configuration OR *cpe:2.3:a:hp:aruba_airwave_amp:*:*:*:*:*:*:*:* versions up to (excluding) 8.2.7.1 *cpe:2.3:a:hp:aruba_clearpass_policy_manager:*:*:*:*:*:*:*:* versions from (including) 6.6.0 up to (including) 6.6.9 *cpe:2.3:a:hp:aruba_clearpass_policy_manager:*:*:*:*:*:*:*:* versions from (including) 6.7.0 up to (including) 6.7.5



Added CPE Configuration Record truncated, showing 500 of 1156 characters.

View Entire Change Record

OR *cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_ Added CPE Configuration Record truncated, showing 500 of 719 characters.

View Entire Change Record

OR *cpe:2.3:o:a10networks:advanced_core_operating_system:3.2.2:*:*:*:*:*:*:* *cpe:2.3:o:a10networks:advanced_core_operating_system:3.2.2:p5:*:*:*:*:*:* *cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.0:*:*:*:*:*:*:* *cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.0:p11:*:*:*:*:*:* *cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.1:p8:*:*:*:*:*:* *cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.2:*:*:*:*:*:*:* *cpe:2.3:o:a10 Added CPE Configuration OR *cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*



Added CPE Configuration OR *cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* *cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*



Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.9



Added CVSS V2 (AV:N/AC:L/Au:N/C:N/I:N/A:C)



Added CVSS V3 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H



Added CWE CWE-20



Changed Reference Type http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt No Types Assigned



http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt Third Party Advisory



Changed Reference Type http://www.securityfocus.com/bid/104976 No Types Assigned



http://www.securityfocus.com/bid/104976 Third Party Advisory, VDB Entry



Changed Reference Type http://www.securitytracker.com/id/1041424 No Types Assigned



http://www.securitytracker.com/id/1041424 Third Party Advisory, VDB Entry



Changed Reference Type http://www.securitytracker.com/id/1041434 No Types Assigned



http://www.securitytracker.com/id/1041434 Third Party Advisory, VDB Entry



Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2384 No Types Assigned



https://access.redhat.com/errata/RHSA-2018:2384 Third Party Advisory



Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2395 No Types Assigned



https://access.redhat.com/errata/RHSA-2018:2395 Third Party Advisory



Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2402 No Types Assigned



https://access.redhat.com/errata/RHSA-2018:2402 Third Party Advisory



Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2403 No Types Assigned



https://access.redhat.com/errata/RHSA-2018:2403 Third Party Advisory



Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2645 No Types Assigned



https://access.redhat.com/errata/RHSA-2018:2645 Third Party Advisory



Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2776 No Types Assigned



https://access.redhat.com/errata/RHSA-2018:2776 Third Party Advisory



Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2785 No Types Assigned



https://access.redhat.com/errata/RHSA-2018:2785 Third Party Advisory



Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2789 No Types Assigned



https://access.redhat.com/errata/RHSA-2018:2789 Third Party Advisory



Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2790 No Types Assigned



https://access.redhat.com/errata/RHSA-2018:2790 Third Party Advisory



Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2791 No Types Assigned



https://access.redhat.com/errata/RHSA-2018:2791 Third Party Advisory



Changed Reference Type https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e No Types Assigned



https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e Patch, Vendor Advisory



Changed Reference Type https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html No Types Assigned



https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html Third Party Advisory



Changed Reference Type https://security.netapp.com/advisory/ntap-20180815-0003/ No Types Assigned



https://security.netapp.com/advisory/ntap-20180815-0003/ Third Party Advisory



Changed Reference Type https://support.f5.com/csp/article/K95343321 No Types Assigned



https://support.f5.com/csp/article/K95343321 Third Party Advisory



Changed Reference Type https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp No Types Assigned



https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp Third Party Advisory



Changed Reference Type https://usn.ubuntu.com/3732-1/ No Types Assigned



https://usn.ubuntu.com/3732-1/ Third Party Advisory



Changed Reference Type https://usn.ubuntu.com/3732-2/ No Types Assigned



https://usn.ubuntu.com/3732-2/ Third Party Advisory



Changed Reference Type https://usn.ubuntu.com/3741-1/ No Types Assigned



https://usn.ubuntu.com/3741-1/ Third Party Advisory



Changed Reference Type https://usn.ubuntu.com/3741-2/ No Types Assigned



https://usn.ubuntu.com/3741-2/ Third Party Advisory



Changed Reference Type https://usn.ubuntu.com/3742-1/ No Types Assigned



https://usn.ubuntu.com/3742-1/ Third Party Advisory



Changed Reference Type https://usn.ubuntu.com/3742-2/ No Types Assigned



https://usn.ubuntu.com/3742-2/ Third Party Advisory



Changed Reference Type https://usn.ubuntu.com/3763-1/ No Types Assigned



https://usn.ubuntu.com/3763-1/ Third Party Advisory



Changed Reference Type https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack No Types Assigned



https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack Mitigation, Third Party Advisory



Changed Reference Type https://www.debian.org/security/2018/dsa-4266 No Types Assigned



https://www.debian.org/security/2018/dsa-4266 Third Party Advisory



Changed Reference Type https://www.kb.cert.org/vuls/id/962459 No Types Assigned



https://www.kb.cert.org/vuls/id/962459 Third Party Advisory, US Government Resource



Changed Reference Type https://www.synology.com/support/security/Synology_SA_18_41 No Types Assigned



https://www.synology.com/support/security/Synology_SA_18_41 Third Party Advisory



CVE Modified by MITRE 9/26/2018 6:29:22 AM Action Type Old Value New Value Added Reference https://access.redhat.com/errata/RHSA-2018:2776 [No Types Assigned]



Added Reference https://access.redhat.com/errata/RHSA-2018:2785 [No Types Assigned]



Added Reference https://access.redhat.com/errata/RHSA-2018:2789 [No Types Assigned]



Added Reference https://access.redhat.com/errata/RHSA-2018:2790 [No Types Assigned]



Added Reference https://access.redhat.com/errata/RHSA-2018:2791 [No Types Assigned]



CVE Modified by MITRE 9/11/2018 6:29:03 AM Action Type Old Value New Value Added Reference https://usn.ubuntu.com/3763-1/ [No Types Assigned]



CVE Modified by MITRE 9/05/2018 6:29:02 AM Action Type Old Value New Value Added Reference https://access.redhat.com/errata/RHSA-2018:2645 [No Types Assigned]



CVE Modified by MITRE 8/28/2018 3:29:20 PM Action Type Old Value New Value Added Reference https://support.f5.com/csp/article/K95343321 [No Types Assigned]



Added Reference https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp [No Types Assigned]



Added Reference https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack [No Types Assigned]



CVE Modified by MITRE 8/25/2018 6:29:01 AM Action Type Old Value New Value Added Reference http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt [No Types Assigned]



CVE Modified by MITRE 8/21/2018 6:29:02 AM Action Type Old Value New Value Added Reference https://usn.ubuntu.com/3741-2/ [No Types Assigned]



CVE Modified by MITRE 8/16/2018 6:29:02 AM Action Type Old Value New Value Added Reference https://access.redhat.com/errata/RHSA-2018:2402 [No Types Assigned]



Added Reference https://access.redhat.com/errata/RHSA-2018:2403 [No Types Assigned]



Added Reference https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html [No Types Assigned]



Added Reference https://security.netapp.com/advisory/ntap-20180815-0003/ [No Types Assigned]



CVE Modified by MITRE 8/15/2018 6:29:05 AM Action Type Old Value New Value Added Reference https://access.redhat.com/errata/RHSA-2018:2384 [No Types Assigned]



Added Reference https://access.redhat.com/errata/RHSA-2018:2395 [No Types Assigned]



Added Reference https://usn.ubuntu.com/3741-1/ [No Types Assigned]



Added Reference https://usn.ubuntu.com/3742-1/ [No Types Assigned]



Added Reference https://usn.ubuntu.com/3742-2/ [No Types Assigned]



CVE Modified by MITRE 8/08/2018 9:29:04 PM Action Type Old Value New Value Added Reference http://www.securitytracker.com/id/1041434 [No Types Assigned]



CVE Modified by MITRE 8/07/2018 9:29:05 PM Action Type Old Value New Value Added Reference http://www.securityfocus.com/bid/104976 [No Types Assigned]



Added Reference http://www.securitytracker.com/id/1041424 [No Types Assigned]



Added Reference https://usn.ubuntu.com/3732-1/ [No Types Assigned]



Added Reference https://usn.ubuntu.com/3732-2/ [No Types Assigned]



Added Reference https://www.debian.org/security/2018/dsa-4266 [No Types Assigned]



Added Reference https://www.synology.com/support/security/Synology_SA_18_41 [No Types Assigned]



Quick Info CVE Dictionary Entry:

CVE-2018-5390

NVD Published Date:

08/06/2018

NVD Last Modified:

09/18/2020

Source:

MITRE

