3 results (0.001 seconds)

CVSS: 9.8EPSS: 3%CPEs: 5EXPL: 0

A buffer overflow in DOSBox 0.74-2 allows attackers to execute arbitrary code. Un desbordamiento de búfer en DOSBox versión 0.74-2 permite a los atacantes ejecutar código arbitrario. • http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00047.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00053.html https://lists.debian.org/debian-lts-announce/2019/07/msg00004.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PYV27Z3QZTDHUZJLW3LDJYO7HBVIMJ5F https://seclists.org/bugtraq/2019/Jul/14 https://security-tracker.debian.org/tracker/CVE-2019-7165 https://www.debian.org/security/2019/dsa-4478 https://www.dosb • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.8EPSS: 1%CPEs: 4EXPL: 1

DOSBox 0.74-2 has Incorrect Access Control. DOSBox 0.74-2 tiene control de acceso incorrecto. • https://github.com/Alexandre-Bartel/CVE-2019-12594 http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00047.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00053.html https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931222 https://lists.debian.org/debian-lts-announce/2019/07/msg00004.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PYV27Z3QZTDHUZJLW3LDJYO7HBVIMJ5F https://seclists.org/bugtraq/2019/Jul/14 https://secur •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

DOSBox 0.72 and earlier allows local users to obtain access to the filesystem on the host operating system via the mount command. NOTE: the researcher reports a vendor response stating that this is not a security problem ** IMPUGNADA ** DOSBox 0.72 y anteriores permite a usuarios locales obtener acceso al sistema de ficheros del sistema operativo de la máquina mediante el comando mount. NOTA: el investigador aporta una respuesta del fabricante afirmando que este no es un problema de seguridad. • http://aluigi.org/poc/dosboxxx.zip http://osvdb.org/44766 http://securityreason.com/securityalert/3442 http://www.securityfocus.com/archive/1/484835/100/0/threaded http://www.securityfocus.com/bid/26802 http://www.vupen.com/english/advisories/2007/4170 https://exchange.xforce.ibmcloud.com/vulnerabilities/38970 •