CVE-2017-3807
Vulnerability from cvelistv5
Published
2017-02-09 17:00
Modified
2024-08-05 14:39
Severity ?
EPSS score ?
Summary
A vulnerability in Common Internet Filesystem (CIFS) code in the Clientless SSL VPN functionality of Cisco ASA Software, Major Releases 9.0-9.6, could allow an authenticated, remote attacker to cause a heap overflow. The vulnerability is due to insufficient validation of user supplied input. An attacker could exploit this vulnerability by sending a crafted URL to the affected system. An exploit could allow the remote attacker to cause a reload of the affected system or potentially execute code. Note: Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects systems configured in routed firewall mode only and in single or multiple context mode. This vulnerability can be triggered by IPv4 or IPv6 traffic. A valid TCP connection is needed to perform the attack. The attacker needs to have valid credentials to log in to the Clientless SSL VPN portal. Vulnerable Cisco ASA Software running on the following products may be affected by this vulnerability: Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA 5500-X Series Next-Generation Firewalls, Cisco Adaptive Security Virtual Appliance (ASAv), Cisco ASA for Firepower 9300 Series, Cisco ASA for Firepower 4100 Series. Cisco Bug IDs: CSCvc23838.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco ASA Software with Clientless SSL VPN portal is enabled Major Releases 9.0-9.6 |
Version: Cisco ASA Software with Clientless SSL VPN portal is enabled Major Releases 9.0-9.6 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:39:40.554Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170208-asa" }, { "name": "41369", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/41369/" }, { "name": "1037797", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037797" }, { "name": "96161", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/96161" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco ASA Software with Clientless SSL VPN portal is enabled Major Releases 9.0-9.6", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco ASA Software with Clientless SSL VPN portal is enabled Major Releases 9.0-9.6" } ] } ], "datePublic": "2017-02-09T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in Common Internet Filesystem (CIFS) code in the Clientless SSL VPN functionality of Cisco ASA Software, Major Releases 9.0-9.6, could allow an authenticated, remote attacker to cause a heap overflow. The vulnerability is due to insufficient validation of user supplied input. An attacker could exploit this vulnerability by sending a crafted URL to the affected system. An exploit could allow the remote attacker to cause a reload of the affected system or potentially execute code. Note: Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects systems configured in routed firewall mode only and in single or multiple context mode. This vulnerability can be triggered by IPv4 or IPv6 traffic. A valid TCP connection is needed to perform the attack. The attacker needs to have valid credentials to log in to the Clientless SSL VPN portal. Vulnerable Cisco ASA Software running on the following products may be affected by this vulnerability: Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA 5500-X Series Next-Generation Firewalls, Cisco Adaptive Security Virtual Appliance (ASAv), Cisco ASA for Firepower 9300 Series, Cisco ASA for Firepower 4100 Series. Cisco Bug IDs: CSCvc23838." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-31T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170208-asa" }, { "name": "41369", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/41369/" }, { "name": "1037797", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1037797" }, { "name": "96161", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/96161" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2017-3807", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco ASA Software with Clientless SSL VPN portal is enabled Major Releases 9.0-9.6", "version": { "version_data": [ { "version_value": "Cisco ASA Software with Clientless SSL VPN portal is enabled Major Releases 9.0-9.6" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in Common Internet Filesystem (CIFS) code in the Clientless SSL VPN functionality of Cisco ASA Software, Major Releases 9.0-9.6, could allow an authenticated, remote attacker to cause a heap overflow. The vulnerability is due to insufficient validation of user supplied input. An attacker could exploit this vulnerability by sending a crafted URL to the affected system. An exploit could allow the remote attacker to cause a reload of the affected system or potentially execute code. Note: Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects systems configured in routed firewall mode only and in single or multiple context mode. This vulnerability can be triggered by IPv4 or IPv6 traffic. A valid TCP connection is needed to perform the attack. The attacker needs to have valid credentials to log in to the Clientless SSL VPN portal. Vulnerable Cisco ASA Software running on the following products may be affected by this vulnerability: Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA 5500-X Series Next-Generation Firewalls, Cisco Adaptive Security Virtual Appliance (ASAv), Cisco ASA for Firepower 9300 Series, Cisco ASA for Firepower 4100 Series. Cisco Bug IDs: CSCvc23838." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170208-asa", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170208-asa" }, { "name": "41369", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/41369/" }, { "name": "1037797", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037797" }, { "name": "96161", "refsource": "BID", "url": "http://www.securityfocus.com/bid/96161" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2017-3807", "datePublished": "2017-02-09T17:00:00", "dateReserved": "2016-12-21T00:00:00", "dateUpdated": "2024-08-05T14:39:40.554Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2017-3807\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2017-02-09T17:59:00.137\",\"lastModified\":\"2024-11-21T03:26:09.250\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in Common Internet Filesystem (CIFS) code in the Clientless SSL VPN functionality of Cisco ASA Software, Major Releases 9.0-9.6, could allow an authenticated, remote attacker to cause a heap overflow. The vulnerability is due to insufficient validation of user supplied input. An attacker could exploit this vulnerability by sending a crafted URL to the affected system. An exploit could allow the remote attacker to cause a reload of the affected system or potentially execute code. Note: Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects systems configured in routed firewall mode only and in single or multiple context mode. This vulnerability can be triggered by IPv4 or IPv6 traffic. A valid TCP connection is needed to perform the attack. The attacker needs to have valid credentials to log in to the Clientless SSL VPN portal. Vulnerable Cisco ASA Software running on the following products may be affected by this vulnerability: Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA 5500-X Series Next-Generation Firewalls, Cisco Adaptive Security Virtual Appliance (ASAv), Cisco ASA for Firepower 9300 Series, Cisco ASA for Firepower 4100 Series. Cisco Bug IDs: CSCvc23838.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en el c\u00f3digo de Common Internet Filesystem (CIFS) en la funcionalidad Clientless SSL VPN de Cisco ASA Software, Major Releases 9.0-9.6, podr\u00eda permitir a un atacante remoto autenticado provocar un desbordamiento de la memoria din\u00e1mica. La vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada suministrada por el usuario. Un atacante podr\u00eda explotar esta vulnerabilidad enviando una URL manipulada al sistema afectado. Una explotaci\u00f3n podr\u00eda permitir al atacante remoto provocar una recarga del sistema afectado o potencialmente ejecutar c\u00f3digo. Nota: Solo tr\u00e1fico dirigido al sistema afectado puede ser usado para explotar esta vulnerabilidad. Esta vulnerabilidad solo afecta a sistemas configurados en modo firewall enrutado y modo de contexto individual o m\u00faltiple. Esta vulnerabilidad puede desencadenarse por tr\u00e1fico IPv4 o IPv6. Se necesita una conexi\u00f3n TCP v\u00e1lida para llevar a cabo el ataque. El atacante necesita tener credenciales v\u00e1lidas para iniciar sesi\u00f3n en el portal Clientless SSL VPN. El software Cisco ASA vulnerable que se ejecuta en los siguientes productos puede verse afectado por esta vulnerabilidad: Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA 5500-X Series Next-Generation Firewalls, Cisco Adaptive Security Virtual Appliance (ASAv), Cisco ASA para Firepower 9300 Series, Cisco ASA para Firepower 4100 Series. Cisco Bug IDs: CSCvc23838.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:P/A:C\",\"baseScore\":8.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.0,\"impactScore\":8.5,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7632C245-04C6-4E78-87B7-55CCCA6FD6C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EA0DDDD-C987-4DA6-ADEE-77B387C26A92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E84099EB-2535-4A9F-8355-FF937CFBD122\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CBC03FE-3A54-450E-A8CE-844C4A6E54B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C599F894-DAD2-4231-8BB8-1427E7C02D60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5123875E-2726-4AD3-A767-04D4F3C15DD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1F60C12-71C9-47C6-B43F-A0374419D736\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CBC6451-C5CE-4A84-8FAD-A0B6DBF67D03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C853CD9-F451-406E-A515-3BDC34E55639\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE4D6D0E-03FD-4C3C-9F6F-0BCE4B9F5D6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B296BB10-E740-4EFC-A9FE-5E8C6D9BA0D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41173D04-CD92-429A-A201-094C324435ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96FB6BAE-322B-48F1-A26D-0ADC86ECCAF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEF3A418-EF33-4BEF-8508-DA573885AE2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"929BF200-619E-4F35-9DDC-8DBFA7728CDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AEBB18A-F33C-4A07-8C3F-5042F5C5B66A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD7C28DC-B15F-486B-96F1-D08529B7374A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9E00BE3-089B-48DB-8626-F5F655271CC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89373AD0-3CC4-4BD0-BA5C-352322BD371C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.7.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"240E8B28-9CC1-4995-91D4-B41ACC96C44B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.7.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DB3077B-59B9-4B33-AE6F-A0AF84EB69EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B03A1408-A55A-4482-B239-B13094B13BFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2ABBFB9E-C009-42B6-A7D7-D897843F9A8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4FCA9A3-94DF-4A5C-84D8-A1E95BC9A8A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9776E3A4-8F5D-4579-992D-EC00F0F7AEA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4400D917-0BEB-49AE-80C9-0F607818EEB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8B53107-BCD0-4D3E-B090-91D6BD6139C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0430DD9-E36F-4911-ABB3-5B1043AE9EBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA3639AA-0F7B-403E-83F9-538A770008E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A929090-A536-44B3-9371-A827FD0BEEFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DB1837E-A87E-435A-8C89-AA6BB55FE9E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF45DF2C-54FF-48FE-A72B-9416CD5A582B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F27FAEFB-6129-44D5-A836-867B24C6A980\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3845853-C6C5-464D-8BEA-4F3D6B53AEDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2.49:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03C6B77C-1AD1-48E5-9279-B9F388066082\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52E87DA1-3BD9-46E3-ADDB-DF7F5B958009\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CDAE653-39BC-443F-B2B0-06BEE9A66E6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2.64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43EB0487-CF1F-4314-BD0D-2F31E4252431\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2.72:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D147236F-7871-4879-86E1-CDD49E9C4C40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2.81:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA8708CA-EA75-40EB-A868-BA78B5753516\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E853B8BF-07F5-46DF-8DEA-302F68B8B086\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64ADB02B-E12A-49F7-84A5-981C51CBD85C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AE8E662-2772-4D98-B01C-694757D9D6C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1950D663-F0C9-4AE1-9595-FDCCDA1D83C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19D6C582-4CCD-4BEA-8367-242CC3BADE0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95627941-30D8-452F-B6C8-76D2BEE93514\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC7C3B04-B4F2-442C-BB54-9F4F192FB80E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DECA50E1-B84C-46DD-AACE-513E9D4C383B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD1E4830-C94A-4B7E-9CE1-63D0A747FBCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C569D949-A2BE-4983-A5C3-14508676B464\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF586164-82BC-4EA9-BE9D-4B6CDBFD7D4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A338318-148E-4EB3-B406-29A55F6E0B73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61F3A543-ECF2-4672-B6B6-DC1AB7D96D7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"364CA0EA-F85E-4C4B-96D8-A7256F413844\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBA148AD-604D-4284-AE41-4E279F616B0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA4087CC-8B4D-42F5-9917-DA5EA2AA684C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26CE8E7E-86CD-458C-AAB4-5901F66FC977\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67AB954E-D1F4-4B29-B782-2E9917D82DE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B943E75A-F816-473B-A458-9C6F3F702414\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C016EF9-C98A-4877-8086-39EA92031FA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E552CFA-627D-4CE5-9E73-E97A1DFCF40F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C47D6AE-7B30-422F-9F7F-2A95608AD3F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF918814-7EC6-4F46-AA7D-6AA52A42DB5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35B55084-8826-4FE1-B0C0-0132354D9CA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC75098F-97F4-4E27-8602-4521048C144C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DA3389C-86FE-45F7-97D7-E3386403944F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B54C2EAD-3E0F-451D-8451-A5D29D005DD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7025DA5B-2C48-4044-B11C-F45FF351311A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31F9B862-1E61-477A-9ADF-8DCCDCB1C239\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E61FFB15-1E0C-4B7C-A506-BE69F1049D6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E53EC396-87B2-46F2-B150-841804F10FAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19432EC8-2C08-4C07-80A1-36BD1A747C4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E501CF3-86C1-4F37-8228-79A698236733\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"730F28DB-DFAC-4D9D-AB4A-42C158F3D88B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"656D49C2-4F2E-4369-8933-FF74A3CD51EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2D2A272-5B6A-426C-B95C-03F1CF92A556\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.2.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1AD5614-6AA5-4607-9B4D-7F40E174B51B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C68E73D6-A207-4276-A972-52B859CD958A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"743B9EEB-8A00-4EDD-A10D-4FC0A8C2E6A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FA384B7-938A-48F7-8154-442E46FB1400\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.3.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0250AEA5-7613-4F64-B90D-D600745F2403\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F44B4A87-D033-4C3F-B1F8-BC40E2CCDC54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00C93F75-E046-4E09-A269-49A55EFF2978\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24CFD97E-113C-4F56-9BF1-D57C81BCA589\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"880058C4-556B-42FF-98AF-4428CB8CB94A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"189D6D5C-1DA2-407A-BE75-2189E04BC9E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D61007E-55D6-4E10-A9CF-B4B5227AC909\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A862D259-40EE-45AE-B896-7F68AC06272C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D33210F-0FA8-4089-AA05-C7AA80C12460\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C2D6C8E-2E0F-4328-8BE5-8E6845B75513\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"313EF49F-4F50-4205-93D8-38B0B18EB7E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E406214-2776-42C2-B777-92E6420FBFBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"837D743B-CCCB-4D30-9B2E-24CBC4F9F9D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B44024A-4500-4ACD-9C92-8EA996188B3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78C2A72E-C42C-456B-B712-D04860CE1A56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CC7F030-18CA-4F56-8F97-69E038319E17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"911DC415-971F-46C1-B804-F8E87A0FD60B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"756BFBA7-D2D1-45D7-B225-A12B4FB82949\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1.0.104:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"200F740F-9D7D-4A64-AE1F-276CF58241C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E4B9D86-8EEB-4A5E-824C-4D7EBD64877A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD242CAB-9DB6-42F3-B649-A963C386C05C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9251926E-96A3-4160-BADB-2DF5CB662B64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1.2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A2B9487-9749-4271-8112-C4FA21611312\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1.2.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E478D1ED-C5AF-46C2-B49B-515A62B653B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1.2.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAAB258C-5D97-489B-8B4E-0511B00BE506\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1.2.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2CF28B6-627D-4E25-BB61-32956239963D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1.2.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E91C88B-7DF8-4ED5-B4BD-8C252C6EF0C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1.2.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"519C99B8-E222-4FA3-8C8F-0DA6019CD6A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1.2.49:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1E26DFA-B023-44B9-80D1-A5E391B571AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1.2.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43F07BA4-A069-4CD5-B0D9-156320CBB5AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1.2.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62CDDEAF-C62D-4364-ACA8-14F14BBFB150\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1.2.56:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21D140D4-1AE3-4D46-9B13-3EC78EBC4FD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.0.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70158003-F6CA-4A5C-893C-BF885A388D31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F2C8AFA-A4B6-44A2-B00C-1950997493C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6297451E-196E-4C6D-9186-451BB42CAE8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"465313C5-BFB9-458A-8150-8F7BA1F8C386\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF399187-270F-4560-9C09-DF18132FA427\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE7A928A-2CBA-43BC-B312-975EE9E24830\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CF721BA-25FF-485E-9102-5741AC9BC9B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F34D78E-68C9-4372-85F2-E74A1C8C06F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05748A45-8423-42F4-8F95-7BA83548C4E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C15D1F6-997D-47FD-A654-AEF3332E6105\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA3E5F50-CBD1-4516-BC97-3AF59DB39A84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62B54134-5AC7-4D7E-A7F1-D4C2057FF146\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AFE499E-09BB-4C86-AC74-7568B2D3CA51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A0B5BF7-18FB-4066-947E-7352B9951AFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B42DD43A-B6BD-4C2B-BA57-928501C62388\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDE65B75-4987-4E77-8814-F7BC9875924A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C890603E-6634-46E2-AFA9-ADE8ED1B9E41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEBAB79E-83BF-4AD1-875B-D015A18ECB82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DA41C5E-F854-4729-9498-C54FA5C00664\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B08E743-488A-4F99-ABA6-98AD534B603B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"978A0B9D-1B1D-4E22-893C-52DE75247BA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD17927A-7AFA-4177-A34E-5FEB7A9400AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E4B884F-EDE6-4055-83D8-609D2D1E518F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8570FBED-D38F-49ED-8C6A-E241BF7E1274\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2889989-8D9C-4E06-8477-8BCF6DC7D84A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02E9724F-AD95-4572-BD8F-27B71F8EBC5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.59:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AA7A0DD-9826-4AD8-B7C8-AD750BD87E4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5990B883-0B5A-44F0-B4DC-8031ED0F2026\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BA74460-D26D-4C0A-B697-DF9003096065\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90BEB7A8-B2DB-46EB-9265-AB88476B1002\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DF80D39-35D2-447C-A809-E4C819FEEF25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7F417BC-5835-4F29-8DB6-03A62B7B2364\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D90599A3-F885-414E-94F9-B4AECEB34D31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0185F882-E031-4B16-8DB3-62F76FBB78C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"092FB46B-A4A4-40E5-B474-4FC36ADC427C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEB27EFB-BF82-493D-ADF2-7395B4E2A55F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AD84D98-1B98-454C-AF63-DE5E76E17C8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D975A3B-0B3C-44E6-BE9C-AA73CF97AF78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DAF32AF-EF06-4663-BFBE-1334D491A212\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9FB85D8-B247-4921-AE49-C2A1C2FDEB5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29BA59C8-F3D0-4B94-824B-F3CDAB465D30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBF3C75D-751C-444F-A4AF-303409B22B1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7CD6FE3-1B32-461E-9215-0F016798B61E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22552CF4-01F8-46A8-ADD4-7BABFA574330\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA1C5485-EAF4-4F4D-AFA1-E105F433665E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"989F9AC4-C2D1-49A0-95C3-79A4EB827E07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFE2E079-D7AC-4FE9-8938-A75C12AF5CA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B442C852-2465-4EA8-A977-1F10A4CE23AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6DB6ED4-3095-46C1-9CB6-2975A7B05303\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE68CD8E-B9CF-4519-8B0E-4C4488B34887\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D762C9A7-005C-44FD-9BB2-7A1DD4EBE90B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE0B1212-87F3-46E5-B14A-C0C6BBAAAC98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"518D4826-06B0-4DDC-B082-A536418FD292\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E343DE08-58FA-4C39-99F9-8CB5F57D0CD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76363698-DB62-4D92-8EE4-069891A9F92C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6159BEE3-D097-4E07-9962-06DB740E2AE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD606591-F69A-47AD-9256-20B98CA16135\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4EF3895-F372-45D3-9C7D-15F5C4712D08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DC5960D-B917-4ABA-850F-A710676ACB40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B746A138-6650-49A3-87C8-3728FE5CF215\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E50C2A13-5A8B-4FA5-ABB8-1157E560503B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"909F9D55-9276-4CF1-BC63-7CEEF8F25C21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F383D276-D5EC-4335-AC09-9D30F6443AF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39C2A7FF-6AC3-42B5-954A-9AA5950C523A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D7F36A8-C291-423D-AF28-56AAD8D0F712\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C2009F4-F832-49D6-8346-54A7328BD93B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9221DD4-498A-4867-B647-47E42299CE45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B839A425-E08C-41B1-9270-E177E40B1E27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F4DDF53-0995-4971-A980-30FD15A40C78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F3BD921-A58A-47EB-B90D-21C3A5D02D40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"800FE449-350D-4C4C-A8C2-D4C5A3B59F36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C49BF8F7-5ACE-4D90-8F17-1AA9D3A2FD7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CE6D050-F186-492C-9813-895433B2612A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6157AA5C-8297-4A32-B0A8-1E7E801E9CD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5A13091-02C6-4D98-90C9-ED4C43BDAFAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2C3E0E1-C3F3-4D53-8116-7D1AF3CD53CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59F3DB48-E1EE-44E9-85DE-9FD7D5C59B4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27E064BD-CBC0-4556-9BCF-87D808809237\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63D5DC14-187B-4808-8377-5FF44A11AA3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64079FC4-53D8-4DBF-A2D5-2CED256F4939\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FF969BE-46BB-4AD7-85AB-8384426E9551\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8EEA7A5-67FD-4CA4-8FF8-4B17A9C47B61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94E618B3-DD03-4ECD-AB9B-97F1EDF95E79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D0DFE19-1C68-40E6-B8CD-9CC03F8B4281\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20424324-881A-496B-BC55-62AA75994249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D67012F3-5153-400E-BD6F-EB0949875F2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E40E9AB5-26E0-4BA2-9AFA-496BAA0EAC77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6BA4B2D-187A-47EC-8BE1-7EA178549476\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CF52FB9-4EA9-41A7-AD29-E963C09FC98C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04C8C6E9-D5C3-42DC-B431-9097B2FCCB52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75B5CF41-7F01-4AE9-B54B-8DB6909504B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3BDD9D1-0DE3-4FA7-BDC1-2A724162CEEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C80EAFF-E577-414A-9DDE-D27A41CB3DC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26CC07CC-0C79-48ED-BEB6-4B576A0DBD68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83FA6817-C5B7-410F-9CF7-801CC958C12E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1576FC7F-B7DD-41DD-A95E-23B1F86E4B02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3768E4B0-E457-47AB-99B0-7C1A0E0CBE35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D142088-0265-4987-8F5C-029F3DD06A18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76EDEE39-865D-4DA3-B1C9-033F2FF1A56F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"500ED3CC-4FE8-4A24-ACFE-8D7E35E50D22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD2AE76B-D04E-4D0C-85E4-8AD07F7BDEDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6E1C03C-0737-4E2B-B3F9-10770281F4AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C7052D2-0789-4A4D-917D-FCD894B7280F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0956F0A8-7424-437C-AAD8-203183BEBFCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49FB57F9-5B37-4509-B2EB-6A16DFE11F03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"952F6504-9CD0-453E-8C25-02BB9EE818F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E842AF74-D1E3-4F71-80F9-197B38942405\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0B97FB1-CC3A-40B5-853D-476E6C5D9D6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F6293A8-C21E-46F6-ACC1-6BBAD419B41F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC1A48B1-112A-41C2-BC01-BCCF5794553D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2AE7036-C8EE-441F-94A4-DE8A9E89CA8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6448B4B4-022D-4D4A-A6DE-0090CEA12595\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42813600-3186-4D19-8AF2-F4F98D3C6740\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC0969E6-151D-4298-8EC8-68D7880E994B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A0091CE-3386-4CCC-A2A8-900842EA6F51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5A450E0-09E4-44C5-B55C-78A4BDAADA45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8285C95A-316D-4965-A34D-3BCB9AB83FA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"213F0A66-A71E-4B64-A66F-EA7B9C0D9151\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D33B43A-1836-4402-AEAC-59CA8F44E3D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\\\(7\\\\)4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07BC9E2D-0B86-4A82-8CB4-A31FFBF322CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\\\(7\\\\)6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9B7B477-15FD-4198-B0D9-0F9A8A2E4C20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\\\(7\\\\)7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6887033-E697-47D0-B6E0-61B64E9D3AC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\\\(7\\\\)9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4C1AB6D-F2C5-4726-8792-581E8DCB9EB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\\\(7\\\\)11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEA1216C-903C-469D-8615-ECFB3AA29BC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\\\(7\\\\)12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0707169B-34B9-4666-8EBD-F5967059D6AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4714F698-BBAE-47BB-99E8-F90D22415EDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB55BC7E-0B3F-4202-8768-08F27B763926\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFB01683-C482-4A5B-90FA-B5266BEA452E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA16481A-4A47-4A8E-8C78-87B3A171280A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C0258ED-6ED0-49C7-A13A-368711649FFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B7A71AA-E1A6-47B7-B2B2-A3115CAA4058\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D448BB56-5B2E-4B3E-B7E8-1F4991F23D81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0346EAC-BDD1-4DC5-B8CA-20579C44AFE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2049D602-54F1-4072-936E-0D7E337162B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0710D6C8-AD34-43E2-B72B-315FFF3DC34F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70F8F1D2-2196-44C4-B420-824F49BB4ACF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E14B8D3-6D53-4E84-9B5D-24667B192C4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A05B2DFD-A0EF-42BE-B00B-334E78CA8C10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CC96C9-492F-49CB-BEFE-356581E96B3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78F1F7D4-EC51-47D1-A71A-9EF98C51D388\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D5E93DE-06C0-401C-8062-1B2EB6EFDED6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E5EBFAB-25E2-4245-B748-92CAA943D4C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8BFB446-5747-42BB-98BC-B8DF250F1842\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EF48794-2E5D-4BE0-9BB5-49ADE34F4A82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\\\(0.0\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3A13A9C-5387-4670-8E20-FE878946D091\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\\\(0.104\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F7C7DA3-C24B-41BB-BDBE-7DC58EEAC4F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\\\(3.1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFC39DA3-8171-4344-A946-7965873C56F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9C31567-8AEB-49C6-AA60-4150411D62AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA140CB2-C17C-4164-A59A-8585906057BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"468D98A7-92D5-4C01-9EDD-CB44B85EA6BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BAAC9FE-CCF0-4385-B5E9-FC424CD3EFD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C9DEB1C-F9B9-4291-92B5-8EEEADC57E51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39330218-32FA-42FF-B5CA-288B7D140304\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A92D7CED-D036-414B-B9EB-DCAF7F425A7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4AAAB02-140D-46F2-A315-5791BF5A853F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EB02DBE-6D60-4D0E-8E9D-7611C3C32748\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31B4370A-84E5-4766-9D9D-EA1C53D73B79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A2F3C77-89CD-4990-98FA-E896079B6C87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5D03293-9765-46DB-B53D-1B23D5C14373\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0286DAF0-FACA-4F94-82E9-EAED8750DB7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25E77826-1208-4582-A94C-242B601BD456\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD617A59-2A4C-4264-BB5D-0126EF292079\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5B9FC85-13B8-488C-80C4-C29C0E244601\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2E7582A-835E-4A84-B197-EB40EE7985C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4C489F4-4501-48D1-830F-169382343B6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A7C150D-8C79-4CF4-A6B6-AA46A94A3B54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\\\(1.50\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E044883-9952-477A-B2AA-3E0BB90C96A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\\\(1.105\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E26A1B0-D61C-4A25-8E10-02A2E3E7A02B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\\\(2.100\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F4A28B7-87A2-464A-92A8-644E3F7D13D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\\\(2.243\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D83ED80-972A-4548-9AB0-10F9A23DF749\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26D99395-D18D-458E-9880-19B7767F69D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E4CE047-3FEF-4A72-AD06-EC77D71EBCD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED33F68A-9EB0-416A-A0A5-0DF2C349FFEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F7DD812-DC72-4816-8B0F-361C32B2CD2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC41D4CD-D5EA-4678-B3AA-962C7C937118\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"996C9552-5743-4639-A077-5B057605DF21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5779CE0-7691-47DA-902C-4D32D6650C9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C69BE69-7C19-4ED3-98D3-04B1D41E56FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7D12EFD-71D6-480E-97D5-278CCE4A7118\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56AE55AB-8170-4E3A-AF89-A8F79599901A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B10653A-0E7C-4014-825D-76B5B438D378\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77642A96-EF7F-4138-97BC-B3793EE0FB52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFE9F46B-DD74-4295-BB6A-9239E29F4416\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.0.115:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8F53875-D589-4C34-B863-67AC9945BED8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8870EB6E-DAE9-45F9-BBA5-2D20E5E00F83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B313B0E-4200-427F-A156-1EDA681F439D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8C49821-3BA5-4B44-84F5-113024FD030F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2011F264-53A5-4507-843B-46F66D285ADB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"290AA0BD-EDB0-4BA4-BF85-9CF29A1B7908\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73FB7BAF-7B3E-4091-A90B-FB19B38FFE74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D2DA09B-CFBA-4FDE-A6D0-7C2CF202D72B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BE2EE9B-D44E-430D-8469-1DF0ADC322B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC6B45EB-97BB-4683-9092-95E560B2585F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D3AA854-0F4D-4B08-A249-B3C19C056D7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E29F95F5-6957-46F0-A0A2-CCACBBA14F90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D9EFD6D-A657-4102-982D-7634AC25E75E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59593836-990A-4CF1-AFBC-516C4A318641\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5479676D-6B3F-4154-B0D4-D2C81E6C941F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.2.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F062A64B-7184-49C6-BDF5-8A413B0A85F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B574E7C0-95AA-4A24-9470-FA282192D85C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F5B88C0-F809-4A58-9708-60C56129142C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EF8738F-8D49-47D3-B60D-3145218C9C09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D146E0E-59DD-48BD-9A74-4E4823590E3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4FB5698-3AEA-4246-A677-7DB3DE73605D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56190201-887B-4157-9323-AAAA1CD86F09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E7AA7A9-F4DB-4BC1-9233-F72B66191F40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03D8C893-BA42-4EE5-A790-13614A6B436F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"339ACF13-0E1F-48D6-9939-96B16AE857CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D5D09C9-4559-4FED-B4B7-EAE5935EBCEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"074A5E58-A066-470B-840A-1148A8979DFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEF2C556-48E6-4572-8FD9-4DC8BAD90B90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDAD792D-70DB-4123-8BCC-B6890A9BCAA8\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/96161\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://www.securitytracker.com/id/1037797\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170208-asa\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/41369/\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://www.securityfocus.com/bid/96161\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1037797\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170208-asa\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/41369/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.