Vulnerabilities (CVE)

Filtered by vendor Symantec Subscribe
Filtered by product Norton App Lock
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-18373 1 Symantec 1 Norton App Lock 2024-11-21 4.4 MEDIUM 5.6 MEDIUM
Norton App Lock, prior to 1.4.0.503, may be susceptible to a bypass exploit. In this type of circumstance, the exploit can allow the user to circumvent the app to prevent it from locking other apps on the device, thereby allowing the individual to gain access.
CVE-2018-5242 1 Symantec 1 Norton App Lock 2024-11-21 7.2 HIGH 6.2 MEDIUM
Norton App Lock prior to version 1.3.0.329 can be susceptible to a bypass exploit. In this type of circumstance, the exploit can allow the user to circumvent the app to prevent it from locking the device, thereby allowing the individual to gain device access.
CVE-2018-5239 1 Symantec 1 Norton App Lock 2024-11-21 7.2 HIGH 6.2 MEDIUM
Norton App Lock prior to v1.3.0.332 can be susceptible to a bypass exploit. In this type of circumstance, the exploit can allow the user to circumvent the app to prevent it from locking the device, thereby allowing the individual to gain device access.
CVE-2018-18363 1 Symantec 1 Norton App Lock 2024-11-21 7.2 HIGH 6.2 MEDIUM
Norton App Lock prior to 1.4.0.445 can be susceptible to a bypass exploit. In this type of circumstance, the exploit can allow the user to circumvent the app to prevent it from locking the device, thereby allowing the individual to gain device access.
CVE-2017-15534 1 Symantec 1 Norton App Lock 2024-11-21 7.2 HIGH 6.7 MEDIUM
The Norton App Lock prior to version 1.3.0.13 can be susceptible to an authentication bypass exploit. In this type of circumstance, the exploit can allow the user to kill the app to prevent it from locking the device, thereby allowing the individual to gain device access.
CVE-2016-6591 1 Symantec 1 Norton App Lock 2024-11-21 3.3 LOW 7.1 HIGH
A security bypass vulnerability exists in Symantec Norton App Lock 1.0.3.186 and earlier if application pinning is enabled, which could let a local malicious user bypass security restrictions.