Show plain JSON{"containers": {"cna": {"affected": [{"product": "SAP NetWeaver AS ABAP Platform(KRNL32NUC)", "vendor": "SAP SE", "versions": [{"status": "affected", "version": "< 7.21"}, {"status": "affected", "version": "< 7.21EXT"}, {"status": "affected", "version": "< 7.22"}, {"status": "affected", "version": "< 7.22EXT"}]}, {"product": "SAP NetWeaver AS ABAP Platform(KRNL32UC)", "vendor": "SAP SE", "versions": [{"status": "affected", "version": "< 7.21"}, {"status": "affected", "version": "< 7.21EXT"}, {"status": "affected", "version": "< 7.22"}, {"status": "affected", "version": "< 7.22EXT"}]}, {"product": "SAP NetWeaver AS ABAP Platform(KRNL64NUC)", "vendor": "SAP SE", "versions": [{"status": "affected", "version": "< 7.21"}, {"status": "affected", "version": "< 7.21EXT"}, {"status": "affected", "version": "< 7.22"}, {"status": "affected", "version": "< 7.22EXT"}, {"status": "affected", "version": "< 7.49"}]}, {"product": "SAP NetWeaver AS ABAP Platform(KRNL64UC)", "vendor": "SAP SE", "versions": [{"status": "affected", "version": "< 7.21"}, {"status": "affected", "version": "< 7.21EXT"}, {"status": "affected", "version": "< 7.22"}, {"status": "affected", "version": "< 7.22EXT"}, {"status": "affected", "version": "< 7.49"}, {"status": "affected", "version": "< 7.73"}]}, {"product": "SAP NetWeaver AS ABAP Platform(KERNEL)", "vendor": "SAP SE", "versions": [{"status": "affected", "version": "< 7.21"}, {"status": "affected", "version": "< 7.45"}, {"status": "affected", "version": "< 7.49"}, {"status": "affected", "version": "< 7.53"}, {"status": "affected", "version": "< 7.73"}]}], "descriptions": [{"lang": "en", "value": "FTP Function of SAP NetWeaver AS ABAP Platform, versions- KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.73, KERNEL 7.21, 7.45, 7.49, 7.53, 7.73, allows an attacker to inject code or specifically manipulated command that can be executed by the application. An attacker could thereby control the behaviour of the application."}], "problemTypes": [{"descriptions": [{"description": "Code Injection", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2019-06-12T16:11:08", "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "shortName": "sap"}, "references": [{"tags": ["x_refsource_MISC"], "url": "https://launchpad.support.sap.com/#/notes/2719530"}, {"tags": ["x_refsource_MISC"], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=521864242"}], "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "cna@sap.com", "ID": "CVE-2019-0304", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "SAP NetWeaver AS ABAP Platform(KRNL32NUC)", "version": {"version_data": [{"version_name": "<", "version_value": "7.21"}, {"version_name": "<", "version_value": "7.21EXT"}, {"version_name": "<", "version_value": "7.22"}, {"version_name": "<", "version_value": "7.22EXT"}]}}, {"product_name": "SAP NetWeaver AS ABAP Platform(KRNL32UC)", "version": {"version_data": [{"version_name": "<", "version_value": "7.21"}, {"version_name": "<", "version_value": "7.21EXT"}, {"version_name": "<", "version_value": "7.22"}, {"version_name": "<", "version_value": "7.22EXT"}]}}, {"product_name": "SAP NetWeaver AS ABAP Platform(KRNL64NUC)", "version": {"version_data": [{"version_name": "<", "version_value": "7.21"}, {"version_name": "<", "version_value": "7.21EXT"}, {"version_name": "<", "version_value": "7.22"}, {"version_name": "<", "version_value": "7.22EXT"}, {"version_name": "<", "version_value": "7.49"}]}}, {"product_name": "SAP NetWeaver AS ABAP Platform(KRNL64UC)", "version": {"version_data": [{"version_name": "<", "version_value": "7.21"}, {"version_name": "<", "version_value": "7.21EXT"}, {"version_name": "<", "version_value": "7.22"}, {"version_name": "<", "version_value": "7.22EXT"}, {"version_name": "<", "version_value": "7.49"}, {"version_name": "<", "version_value": "7.73"}]}}, {"product_name": "SAP NetWeaver AS ABAP Platform(KERNEL)", "version": {"version_data": [{"version_name": "<", "version_value": "7.21"}, {"version_name": "<", "version_value": "7.45"}, {"version_name": "<", "version_value": "7.49"}, {"version_name": "<", "version_value": "7.53"}, {"version_name": "<", "version_value": "7.73"}]}}]}, "vendor_name": "SAP SE"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "FTP Function of SAP NetWeaver AS ABAP Platform, versions- KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.73, KERNEL 7.21, 7.45, 7.49, 7.53, 7.73, allows an attacker to inject code or specifically manipulated command that can be executed by the application. An attacker could thereby control the behaviour of the application."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "Code Injection"}]}]}, "references": {"reference_data": [{"name": "https://launchpad.support.sap.com/#/notes/2719530", "refsource": "MISC", "url": "https://launchpad.support.sap.com/#/notes/2719530"}, {"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=521864242", "refsource": "MISC", "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=521864242"}]}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-04T17:44:16.439Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://launchpad.support.sap.com/#/notes/2719530"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=521864242"}]}]}, "cveMetadata": {"assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "assignerShortName": "sap", "cveId": "CVE-2019-0304", "datePublished": "2019-06-12T14:21:39", "dateReserved": "2018-11-26T00:00:00", "dateUpdated": "2024-08-04T17:44:16.439Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}