Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
lock vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2018-5242
Norton App Lock prior to version 1.3.0.329 can be susceptible to a bypass exploit. In this type of circumstance, the exploit can allow the user to circumvent the app to prevent it from locking the device, thereby allowing the individual to gain device access.
Symantec Norton App Lock
8.5
CVSSv2
CVE-2015-8772
McPvDrv.sys 4.6.111.0 in McAfee File Lock 5.x in McAfee Total Protection allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a large VERIFY_INFORMATION.Length value in an IOCTL_DISK_VERIFY ioctl call.
Mcafee File Lock 5.0
7.8
CVSSv2
CVE-2015-8773
Stack-based buffer overflow in McPvDrv.sys 4.6.111.0 in McAfee File Lock 5.x in McAfee Total Protection allows malicious users to cause a denial of service (system crash) via a long vault GUID in an ioctl call.
Mcafee File Lock 5.0
NA
CVE-2023-4307
The Lock User Account WordPress plugin up to and including 1.0.3 does not have CSRF check when bulk locking and unlocking accounts, which could allow malicious users to make logged in admins lock and unlock arbitrary users via a CSRF attack
Teknigar Lock User Account
NA
CVE-2023-29733
The Lock Master app 2.2.4 for Android allows unauthorized apps to modify the values in its SharedPreference files. These files hold data that affects many app functions. Malicious modifications by unauthorized apps can cause security issues, such as functionality manipulation, re...
Dualspace Lock Master 2.2.4
2.1
CVSSv2
CVE-1999-1540
shell-lock in Cactus Software Shell Lock uses weak encryption (trivial encoding) which allows malicious users to easily decrypt and obtain the source code.
Cactus Software Shell-lock
7.2
CVSSv2
CVE-1999-1541
shell-lock in Cactus Software Shell Lock allows local users to read or modify decoded shell files before they are executed, via a symlink attack on a temporary file.
Cactus Software Shell-lock
7.2
CVSSv2
CVE-2017-15534
The Norton App Lock prior to version 1.3.0.13 can be susceptible to an authentication bypass exploit. In this type of circumstance, the exploit can allow the user to kill the app to prevent it from locking the device, thereby allowing the individual to gain device access.
Symantec Norton App Lock
3.5
CVSSv2
CVE-2020-23039
Folder Lock v3.4.5 exists to contain a stored cross-site scripting (XSS) vulnerability in the Create Folder function under the 'create' module. This vulnerability allows malicious users to execute arbitrary web scripts or HTML via a crafted payload as a path or folder n...
Newsoftwares Folder Lock 3.4.5
NA
CVE-2023-27647
An issue found in DUALSPACE Lock Master v.2.2.4 allows a local malicious user to cause a denial of service or gain sensitive information via the com.ludashi.superlock.util.pref.SharedPrefProviderEntryMethod: insert of the android.net.Uri.insert method.
Dualspace Lock Master 2.2.4
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-30310
CVE-2024-21683
CVE-2024-22187
chrome
deserialization
XPath injection
CVE-2024-27842
denial of service
CVE-2024-24851
google
CVE-2024-35400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »