Show plain JSON{"id": "CVE-2019-19943", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 3.9}]}, "published": "2020-02-28T20:15:11.460", "references": [{"url": "https://www.exploit-db.com/exploits/48111", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"], "source": "cve@mitre.org"}, {"url": "https://www.exploit-db.com/exploits/48111", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-415"}, {"lang": "en", "value": "CWE-787"}]}], "descriptions": [{"lang": "en", "value": "The HTTP service in quickweb.exe in Pablo Quick 'n Easy Web Server 3.3.8 allows Remote Unauthenticated Heap Memory Corruption via a large host or domain parameter. It may be possible to achieve remote code execution because of a double free."}, {"lang": "es", "value": "El servicio HTTP en el archivo quickweb.exe en Pablo Quick 'n Easy Web Server versi\u00f3n 3.3.8, permite una Corrupci\u00f3n de Memoria de la Pila No Autenticada Remota por medio de un par\u00e1metro host o domain de gran tama\u00f1o. Puede ser posible lograr una ejecuci\u00f3n de c\u00f3digo remota debido a una doble liberaci\u00f3n."}], "lastModified": "2024-11-21T04:35:42.573", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:pablosoftwaresolutions:quick_\\'n_easy_web_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D8744270-FBC2-4B77-BAFF-DC979547266C", "versionEndIncluding": "3.3.8"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}