U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • Keyword (text search): apple ios passcode
  • Search Type: Search All
There are 30 matching records.
Displaying matches 21 through 30.
Vuln ID Summary CVSS Severity
CVE-2012-3737

The Passcode Lock implementation in Apple iOS before 6 does not properly restrict photo viewing, which allows physically proximate attackers to view arbitrary stored photos by spoofing a time value.

Published: September 20, 2012; 5:55:04 PM -0400
V3.x:(not available)
V2.0: 2.1 LOW
CVE-2012-3736

The Passcode Lock implementation in Apple iOS before 6 allows physically proximate attackers to bypass an intended passcode requirement via vectors related to ending a FaceTime call.

Published: September 20, 2012; 5:55:03 PM -0400
V3.x:(not available)
V2.0: 4.6 MEDIUM
CVE-2012-3735

The Passcode Lock implementation in Apple iOS before 6 does not properly interact with the "Slide to Power Off" feature, which allows physically proximate attackers to see the most recently used third-party app by watching the device's screen.

Published: September 20, 2012; 5:55:03 PM -0400
V3.x:(not available)
V2.0: 2.1 LOW
CVE-2012-3731

Mail in Apple iOS before 6 does not properly implement the Data Protection feature for e-mail attachments, which allows physically proximate attackers to bypass an intended passcode requirement via unspecified vectors.

Published: September 20, 2012; 5:55:03 PM -0400
V3.x:(not available)
V2.0: 2.1 LOW
CVE-2012-0644

Race condition in the Passcode Lock feature in Apple iOS before 5.1 allows physically proximate attackers to bypass intended passcode requirements via a slide-to-dial gesture.

Published: March 08, 2012; 5:55:04 PM -0500
V3.x:(not available)
V2.0: 6.9 MEDIUM
CVE-2011-3440

The Passcode Lock feature in Apple iOS before 5.0.1 on the iPad 2 does not properly implement the locked state, which allows physically proximate attackers to access data by opening a Smart Cover during power-off confirmation.

Published: November 11, 2011; 1:55:01 PM -0500
V3.x:(not available)
V2.0: 1.2 LOW
CVE-2011-3429

The Settings component in Apple iOS before 5 stores a cleartext parental-restrictions passcode in an unspecified file, which might allow physically proximate attackers to obtain sensitive information by reading this file.

Published: October 14, 2011; 6:55:10 AM -0400
V3.x:(not available)
V2.0: 2.1 LOW
CVE-2010-4012

Race condition in Apple iOS 4.0 through 4.1 for iPhone 3G and later allows physically proximate attackers to bypass the passcode lock by making a call from the Emergency Call screen, then quickly pressing the Sleep/Wake button.

Published: December 08, 2010; 3:00:01 PM -0500
V3.x:(not available)
V2.0: 6.2 MEDIUM
CVE-2010-1775

Race condition in Passcode Lock in Apple iOS before 4 on the iPhone and iPod touch allows physically proximate attackers to bypass intended passcode requirements, and pair a locked device with a computer and access arbitrary data, via vectors involving the initial boot.

Published: June 22, 2010; 4:30:01 PM -0400
V3.x:(not available)
V2.0: 1.9 LOW
CVE-2010-1754

Passcode Lock in Apple iOS before 4 on the iPhone and iPod touch does not properly handle alert-based unlocks in conjunction with subsequent Remote Lock operations through MobileMe, which allows physically proximate attackers to bypass intended passcode requirements via unspecified vectors.

Published: June 22, 2010; 4:30:01 PM -0400
V3.x:(not available)
V2.0: 6.9 MEDIUM