Логотип exploitDog
bind:CVE-2021-20315
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-20315

Количество 5

Количество 5

ubuntu логотип

CVE-2021-20315

почти 4 года назад

A locking protection bypass flaw was found in some versions of gnome-shell as shipped within CentOS Stream 8, when the "Application menu" or "Window list" GNOME extensions are enabled. This flaw allows a physical attacker who has access to a locked system to kill existing applications and start new ones as the locked user, even if the session is still locked.

CVSS3: 6.1
EPSS: Низкий
redhat логотип

CVE-2021-20315

больше 4 лет назад

A locking protection bypass flaw was found in some versions of gnome-shell as shipped within CentOS Stream 8, when the "Application menu" or "Window list" GNOME extensions are enabled. This flaw allows a physical attacker who has access to a locked system to kill existing applications and start new ones as the locked user, even if the session is still locked.

CVSS3: 5.7
EPSS: Низкий
nvd логотип

CVE-2021-20315

почти 4 года назад

A locking protection bypass flaw was found in some versions of gnome-shell as shipped within CentOS Stream 8, when the "Application menu" or "Window list" GNOME extensions are enabled. This flaw allows a physical attacker who has access to a locked system to kill existing applications and start new ones as the locked user, even if the session is still locked.

CVSS3: 6.1
EPSS: Низкий
debian логотип

CVE-2021-20315

почти 4 года назад

A locking protection bypass flaw was found in some versions of gnome-s ...

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-hpr5-wwh9-pjhf

почти 4 года назад

A locking protection bypass flaw was found in some versions of gnome-shell as shipped within CentOS Stream 8, when the "Application menu" or "Window list" GNOME extensions are enabled. This flaw allows a physical attacker who has access to a locked system to kill existing applications and start new ones as the locked user, even if the session is still locked.

CVSS3: 6.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-20315

A locking protection bypass flaw was found in some versions of gnome-shell as shipped within CentOS Stream 8, when the "Application menu" or "Window list" GNOME extensions are enabled. This flaw allows a physical attacker who has access to a locked system to kill existing applications and start new ones as the locked user, even if the session is still locked.

CVSS3: 6.1
0%
Низкий
почти 4 года назад
redhat логотип
CVE-2021-20315

A locking protection bypass flaw was found in some versions of gnome-shell as shipped within CentOS Stream 8, when the "Application menu" or "Window list" GNOME extensions are enabled. This flaw allows a physical attacker who has access to a locked system to kill existing applications and start new ones as the locked user, even if the session is still locked.

CVSS3: 5.7
0%
Низкий
больше 4 лет назад
nvd логотип
CVE-2021-20315

A locking protection bypass flaw was found in some versions of gnome-shell as shipped within CentOS Stream 8, when the "Application menu" or "Window list" GNOME extensions are enabled. This flaw allows a physical attacker who has access to a locked system to kill existing applications and start new ones as the locked user, even if the session is still locked.

CVSS3: 6.1
0%
Низкий
почти 4 года назад
debian логотип
CVE-2021-20315

A locking protection bypass flaw was found in some versions of gnome-s ...

CVSS3: 6.1
0%
Низкий
почти 4 года назад
github логотип
GHSA-hpr5-wwh9-pjhf

A locking protection bypass flaw was found in some versions of gnome-shell as shipped within CentOS Stream 8, when the "Application menu" or "Window list" GNOME extensions are enabled. This flaw allows a physical attacker who has access to a locked system to kill existing applications and start new ones as the locked user, even if the session is still locked.

CVSS3: 6.1
0%
Низкий
почти 4 года назад

Уязвимостей на страницу