Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 12 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lockerproject
Lockerproject locker |
|
| Vendors & Products |
Lockerproject
Lockerproject locker |
Wed, 11 Mar 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security flaw has been discovered in LockerProject Locker 0.0.0/0.0.1/0.1.0. Affected is the function authIsAwesome of the file source-code/Locker-master/Ops/registry.js of the component Error Response Handler. The manipulation of the argument ID results in cross site scripting. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet. | |
| Title | LockerProject Locker Error Response registry.js authIsAwesome cross site scripting | |
| Weaknesses | CWE-79 CWE-94 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-12T19:58:03.250Z
Reserved: 2026-03-11T12:09:22.394Z
Link: CVE-2026-3951
Updated: 2026-03-12T19:57:56.852Z
Status : Awaiting Analysis
Published: 2026-03-11T20:16:23.253
Modified: 2026-03-12T21:08:22.643
Link: CVE-2026-3951
No data.
OpenCVE Enrichment
Updated: 2026-03-12T09:56:40Z