Show filters
4 Total Results
Displaying 1-4 of 4
Sort by:
Attacker Value
Unknown

CVE-2021-34557

Disclosure Date: June 10, 2021 (last updated February 22, 2025)
XScreenSaver 5.45 can be bypassed if the machine has more than ten disconnectable video outputs. A buffer overflow in update_screen_layout() allows an attacker to bypass the standard screen lock authentication mechanism by crashing XScreenSaver. The attacker must physically disconnect many video outputs.
Attacker Value
Unknown

CVE-2021-31523

Disclosure Date: April 21, 2021 (last updated February 22, 2025)
The Debian xscreensaver 5.42+dfsg1-1 package for XScreenSaver has cap_net_raw enabled for the /usr/libexec/xscreensaver/sonar file, which allows local users to gain privileges because this is arguably incompatible with the design of the Mesa 3D Graphics library dependency.
Attacker Value
Unknown

CVE-2011-2187

Disclosure Date: November 27, 2019 (last updated November 27, 2024)
xscreensaver before 5.14 crashes during activation and leaves the screen unlocked when in Blank Only Mode and when DPMS is disabled, which allows local attackers to access resources without authentication.
Attacker Value
Unknown

CVE-2015-8025

Disclosure Date: November 10, 2015 (last updated October 05, 2023)
driver/subprocs.c in XScreenSaver before 5.34 does not properly perform an internal consistency check, which allows physically proximate attackers to bypass the lock screen by hot swapping monitors.
0