ASA-201908-8 - log back

ASA-201908-8 created at 25 Sep 2019 19:32:14
Workaround
Impact
+ An authenticated attacker can read arbitrary bytes of server memory or execute arbitrary SQL commands under a different identity than its own.