Lucene search

K

6 matches found

CVE
CVE
added 2010/02/24 6:30 p.m.53 views

CVE-2010-0285

gnome-screensaver 2.14.3, 2.22.2, 2.27.x, 2.28.0, and 2.28.3, when the X configuration enables the extend screen option, allows physically proximate attackers to bypass screen locking, access an unattended workstation, and view half of the GNOME desktop by attaching an external monitor.

5.6CVSS6.3AI score0.00083EPSS
CVE
CVE
added 2010/03/19 7:30 p.m.49 views

CVE-2010-0732

gdk/gdkwindow.c in GTK+ before 2.18.5, as used in gnome-screensaver before 2.28.1, performs implicit paints on windows of type GDK_WINDOW_FOREIGN, which triggers an X error in certain circumstances and consequently allows physically proximate attackers to bypass screen locking and access an unatten...

6.2CVSS9.2AI score0.00041EPSS
CVE
CVE
added 2010/02/24 6:30 p.m.47 views

CVE-2010-0422

gnome-screensaver 2.28.x before 2.28.3 does not properly synchronize the state of screen locking and the unlock dialog in situations involving a change to the number of monitors, which allows physically proximate attackers to bypass screen locking and access an unattended workstation by connecting ...

4CVSS6.3AI score0.00076EPSS
CVE
CVE
added 2010/02/11 9:30 p.m.40 views

CVE-2009-4641

gnome-screensaver 2.28.0 does not resume adherence to its activation settings after an inhibiting application becomes unavailable on the session bus, which allows physically proximate attackers to access an unattended workstation on which screen locking had been intended.

7.2CVSS6.3AI score0.00053EPSS
CVE
CVE
added 2010/02/11 8:30 p.m.40 views

CVE-2010-0414

gnome-screensaver before 2.28.2 allows physically proximate attackers to bypass screen locking and access an unattended workstation by moving the mouse position to an external monitor and then disconnecting that monitor.

7.2CVSS6.3AI score0.00053EPSS
CVE
CVE
added 2010/02/11 9:30 p.m.39 views

CVE-2009-4642

gnome-screensaver 2.26.1 relies on the gnome-session D-Bus interface to determine session idle time, even when an Xfce desktop such as Xubuntu or Mythbuntu is used, which allows physically proximate attackers to access an unattended workstation on which screen locking had been intended.

7.2CVSS6.6AI score0.00155EPSS