CVE-2021-34557
- EPSS 0.07%
- Published 10.06.2021 16:15:08
- Last modified 21.11.2024 06:10:40
XScreenSaver 5.45 can be bypassed if the machine has more than ten disconnectable video outputs. A buffer overflow in update_screen_layout() allows an attacker to bypass the standard screen lock authentication mechanism by crashing XScreenSaver. The ...
CVE-2021-31523
- EPSS 0.04%
- Published 21.04.2021 19:15:35
- Last modified 21.11.2024 06:05:51
The Debian xscreensaver 5.42+dfsg1-1 package for XScreenSaver has cap_net_raw enabled for the /usr/libexec/xscreensaver/sonar file, which allows local users to gain privileges because this is arguably incompatible with the design of the Mesa 3D Graph...
CVE-2011-2187
- EPSS 0.1%
- Published 27.11.2019 18:15:10
- Last modified 21.11.2024 01:27:46
xscreensaver before 5.14 crashes during activation and leaves the screen unlocked when in Blank Only Mode and when DPMS is disabled, which allows local attackers to access resources without authentication.
CVE-2015-8025
- EPSS 0.06%
- Published 10.11.2015 17:59:11
- Last modified 12.04.2025 10:46:40
driver/subprocs.c in XScreenSaver before 5.34 does not properly perform an internal consistency check, which allows physically proximate attackers to bypass the lock screen by hot swapping monitors.