mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
82 lines
2.6 KiB
JSON
82 lines
2.6 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "product-security@apple.com",
|
|
"ID": "CVE-2012-3750",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The Passcode Lock implementation in Apple iOS before 6.0.1 does not properly manage the lock state, which allows physically proximate attackers to bypass an intended passcode requirement and access Passbook passes via unspecified vectors."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "56363",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/56363"
|
|
},
|
|
{
|
|
"name": "http://support.apple.com/kb/HT5567",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://support.apple.com/kb/HT5567"
|
|
},
|
|
{
|
|
"name": "appleios-passcode-sec-bypass(79747)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79747"
|
|
},
|
|
{
|
|
"name": "APPLE-SA-2012-11-01-1",
|
|
"refsource": "APPLE",
|
|
"url": "http://lists.apple.com/archives/security-announce/2012/Nov/msg00000.html"
|
|
},
|
|
{
|
|
"name": "20121101 APPLE-SA-2012-11-01-1 iOS 6.0.1",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-11/0012.html"
|
|
}
|
|
]
|
|
}
|
|
} |