{"id":"CVE-2018-19937","details":"A local, authenticated attacker can bypass the passcode in the VideoLAN VLC media player app before 3.1.5 for iOS by opening a URL and turning the phone.","modified":"2026-03-12T22:48:58.170677Z","published":"2018-12-31T16:29:00.407Z","references":[{"type":"ADVISORY","url":"https://itunes.apple.com/ms/app/vlc-for-mobile/id650377962?mt=8"},{"type":"FIX","url":"https://github.com/videolan/vlc-ios/pull/178/commits/d84d7c0a94eb7fba202d2c5fc3739276d2d3986f"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/videolan/vlc-ios","events":[{"introduced":"0"},{"fixed":"97b523169be0a2663fa92baebe6d6151305ffeb3"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"3.1.5"}]}}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-19937.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}