Xcode
com.apple.dt.Xcode
Voir sur Mac App Store ↗
Aussi sur Homebrew
Aussi sur Android
Historique
Version courante : 6.3.2
- Vulnérabilités connues
- 91
- Toujours ouvertes
- 30
- KEV ouvertes
- 0
- Score CVSS max
- 10.0
2 au total (historique)
Vulnérabilités (CVE) connues
Tester une autre version
| CVE | Statut | Sévérité | KEV | Publié | Corrigé en |
|---|---|---|---|---|---|
|
CVE-2026-28889
MEDIUM 6.2
Corrigé en: 26.4
|
Inconnu | MEDIUM 6.2 | — | 26.4 | |
|
CVE-2026-28890
MEDIUM 5.5
Corrigé en: 26.4
|
Inconnu | MEDIUM 5.5 | — | 26.4 | |
|
CVE-2025-31186
LOW 3.3
Corrigé en: 16.3
|
Inconnu | LOW 3.3 | — | 16.3 | |
|
CVE-2025-43504
MEDIUM 4.9
Corrigé en: 26.1
|
Inconnu | MEDIUM 4.9 | — | 26.1 | |
|
CVE-2025-43505
HIGH 8.8
Corrigé en: 26.1
|
Inconnu | HIGH 8.8 | — | 26.1 | |
|
CVE-2025-43375
MEDIUM 5.5
Corrigé en: 26.0
|
Inconnu | MEDIUM 5.5 | — | 26.0 | |
|
CVE-2025-43370
MEDIUM 4.0
Corrigé en: 26.0
|
Inconnu | MEDIUM 4.0 | — | 26.0 | |
|
CVE-2025-43371
HIGH 8.2
Corrigé en: 26.0
|
Inconnu | HIGH 8.2 | — | 26.0 | |
|
CVE-2025-43263
HIGH 7.1
Corrigé en: 26.0
|
Inconnu | HIGH 7.1 | — | 26.0 | |
|
CVE-2025-48384
HIGH 8.0
KEV
Corrigé en: 26.0
|
Inconnu | HIGH 8.0 | KEV | 26.0 | |
|
CVE-2025-30441
MEDIUM 5.5
Corrigé en: 16.3
|
Inconnu | MEDIUM 5.5 | — | 16.3 | |
|
CVE-2025-24226
MEDIUM 5.5
Corrigé en: 16.3
|
Inconnu | MEDIUM 5.5 | — | 16.3 | |
|
CVE-2024-44228
HIGH 7.5
Corrigé en: 16.0
|
Inconnu | HIGH 7.5 | — | 16.0 | |
|
CVE-2024-44162
HIGH 7.8
Corrigé en: 16.0
|
Inconnu | HIGH 7.8 | — | 16.0 | |
|
CVE-2024-40862
MEDIUM 5.3
Corrigé en: 16.0
|
Inconnu | MEDIUM 5.3 | — | 16.0 | |
|
CVE-2024-23298
MEDIUM 5.5
Corrigé en: 15.3
|
Inconnu | MEDIUM 5.5 | — | 15.3 | |
|
CVE-2023-40435
MEDIUM 5.5
Corrigé en: 15.0
|
Inconnu | MEDIUM 5.5 | — | 15.0 | |
|
CVE-2022-32920
MEDIUM 5.5
Corrigé en: 14.0
|
Inconnu | MEDIUM 5.5 | — | 14.0 | |
|
CVE-2023-27967
HIGH 8.6
Corrigé en: 14.3
|
Inconnu | HIGH 8.6 | — | 14.3 | |
|
CVE-2023-27945
MEDIUM 6.3
Corrigé en: 14.3
|
Inconnu | MEDIUM 6.3 | — | 14.3 | |
|
CVE-2022-42797
HIGH 7.8
Corrigé en: 14.1
|
Inconnu | HIGH 7.8 | — | 14.1 | |
|
CVE-2022-39260
HIGH 8.5
Corrigé en: 14.1
|
Inconnu | HIGH 8.5 | — | 14.1 | |
|
CVE-2022-39253
MEDIUM 5.5
Corrigé en: 14.1
|
Inconnu | MEDIUM 5.5 | — | 14.1 | |
|
CVE-2022-29187
HIGH 7.8
Corrigé en: 14.1
|
Inconnu | HIGH 7.8 | — | 14.1 | |
|
CVE-2022-26747
HIGH 7.8
Corrigé en: 13.4
|
Inconnu | HIGH 7.8 | — | 13.4 | |
|
CVE-2022-24765
MEDIUM 6.0
Corrigé en: 13.4
|
Inconnu | MEDIUM 6.0 | — | 13.4 | |
|
CVE-2022-22601
HIGH 7.8
Corrigé en: 13.3
|
Inconnu | HIGH 7.8 | — | 13.3 | |
|
CVE-2022-22602
HIGH 7.8
Corrigé en: 13.3
|
Inconnu | HIGH 7.8 | — | 13.3 | |
|
CVE-2022-22603
HIGH 7.8
Corrigé en: 13.3
|
Inconnu | HIGH 7.8 | — | 13.3 | |
|
CVE-2022-22604
HIGH 7.8
Corrigé en: 13.3
|
Inconnu | HIGH 7.8 | — | 13.3 | |
|
CVE-2022-22605
HIGH 7.8
Corrigé en: 13.3
|
Inconnu | HIGH 7.8 | — | 13.3 | |
|
CVE-2022-22606
HIGH 7.8
Corrigé en: 13.3
|
Inconnu | HIGH 7.8 | — | 13.3 | |
|
CVE-2022-22607
HIGH 7.8
Corrigé en: 13.3
|
Inconnu | HIGH 7.8 | — | 13.3 | |
|
CVE-2022-22608
HIGH 7.8
Corrigé en: 13.3
|
Inconnu | HIGH 7.8 | — | 13.3 | |
|
CVE-2021-44228
CRITICAL 10.0
KEV
Corrigé en: 13.3
|
Inconnu | CRITICAL 10.0 | KEV | 13.3 | |
|
CVE-2021-1800
MEDIUM 5.5
Corrigé en: 12.4
|
Ouverte | MEDIUM 5.5 | — | 12.4 | |
|
CVE-2021-21300
HIGH 8.0
Corrigé en: 12.5
|
Ouverte | HIGH 8.0 | — | 12.5 | |
|
CVE-2019-8840
HIGH 8.8
Corrigé en: 11.3
|
Ouverte | HIGH 8.8 | — | 11.3 | |
|
CVE-2014-9390
CRITICAL 9.8
|
Inconnu | CRITICAL 9.8 | — | — | |
|
CVE-2019-20372
MEDIUM 5.3
Corrigé en: 13.0
|
Inconnu | MEDIUM 5.3 | — | 13.0 | |
|
CVE-2019-8806
HIGH 7.8
Corrigé en: 11.2
|
Ouverte | HIGH 7.8 | — | 11.2 | |
|
CVE-2019-8800
HIGH 7.8
Corrigé en: 11.2
|
Ouverte | HIGH 7.8 | — | 11.2 | |
|
CVE-2019-8739
HIGH 7.8
Corrigé en: 11.0
|
Ouverte | HIGH 7.8 | — | 11.0 | |
|
CVE-2019-8724
HIGH 8.8
Corrigé en: 11.0
|
Ouverte | HIGH 8.8 | — | 11.0 | |
|
CVE-2019-8738
HIGH 7.8
Corrigé en: 11.0
|
Ouverte | HIGH 7.8 | — | 11.0 | |
|
CVE-2019-8721
HIGH 8.8
Corrigé en: 11.0
|
Ouverte | HIGH 8.8 | — | 11.0 | |
|
CVE-2019-8722
HIGH 8.8
Corrigé en: 11.0
|
Ouverte | HIGH 8.8 | — | 11.0 | |
|
CVE-2019-8723
HIGH 8.8
Corrigé en: 11.0
|
Ouverte | HIGH 8.8 | — | 11.0 | |
|
CVE-2019-14379
CRITICAL 9.8
Corrigé en: 13.3
|
Inconnu | CRITICAL 9.8 | — | 13.3 | |
|
CVE-2018-4357
HIGH 7.8
Corrigé en: 10
|
Ouverte | HIGH 7.8 | — | 10 | |
|
CVE-2019-3855
HIGH 8.8
Corrigé en: 11.0
|
Ouverte | HIGH 8.8 | — | 11.0 | |
|
CVE-2018-16843
HIGH 7.5
Corrigé en: 13.0
|
Inconnu | HIGH 7.5 | — | 13.0 | |
|
CVE-2018-16844
HIGH 7.5
Corrigé en: 13.0
|
Inconnu | HIGH 7.5 | — | 13.0 | |
|
CVE-2018-16845
MEDIUM 6.1
Corrigé en: 13.0
|
Inconnu | MEDIUM 6.1 | — | 13.0 | |
|
CVE-2018-4164
CRITICAL 9.8
Corrigé en: 9.3
|
Ouverte | CRITICAL 9.8 | — | 9.3 | |
|
CVE-2017-7167
HIGH 7.8
Corrigé en: 9.2
|
Ouverte | HIGH 7.8 | — | 9.2 | |
|
CVE-2017-7134
HIGH 7.8
Corrigé en: 8.3.3+
|
Ouverte | HIGH 7.8 | — | 8.3.3+ | |
|
CVE-2017-7135
HIGH 7.8
Corrigé en: 8.3.3+
|
Ouverte | HIGH 7.8 | — | 8.3.3+ | |
|
CVE-2017-7136
HIGH 7.8
Corrigé en: 8.3.3+
|
Ouverte | HIGH 7.8 | — | 8.3.3+ | |
|
CVE-2017-7137
HIGH 7.8
Corrigé en: 8.3.3+
|
Ouverte | HIGH 7.8 | — | 8.3.3+ | |
|
CVE-2017-7529
HIGH 7.5
Corrigé en: 13.0
|
Inconnu | HIGH 7.5 | — | 13.0 | |
|
CVE-2016-4705
HIGH 7.8
Corrigé en: 7.3.1+
|
Ouverte | HIGH 7.8 | — | 7.3.1+ | |
|
CVE-2016-4704
HIGH 7.8
Corrigé en: 7.3.1+
|
Ouverte | HIGH 7.8 | — | 7.3.1+ | |
|
CVE-2016-1765
HIGH 7.8
Corrigé en: 7.2.1+
|
Ouverte | HIGH 7.8 | — | 7.2.1+ | |
|
CVE-2016-0747
MEDIUM 5.3
Corrigé en: 13.0
|
Inconnu | MEDIUM 5.3 | — | 13.0 | |
|
CVE-2016-0746
CRITICAL 9.8
Corrigé en: 13.0
|
Inconnu | CRITICAL 9.8 | — | 13.0 | |
|
CVE-2016-0742
HIGH 7.5
Corrigé en: 13.0
|
Inconnu | HIGH 7.5 | — | 13.0 | |
|
CVE-2015-7057
N/A
Corrigé en: 7.1.1+
|
Ouverte | N/A | — | 7.1.1+ | |
|
CVE-2015-7056
N/A
Corrigé en: 7.1.1+
|
Ouverte | N/A | — | 7.1.1+ | |
|
CVE-2015-7049
N/A
Corrigé en: 7.1.1+
|
Ouverte | N/A | — | 7.1.1+ | |
|
CVE-2015-7030
N/A
Corrigé en: 7.0+
|
Ouverte | N/A | — | 7.0+ | |
|
CVE-2015-5910
N/A
Corrigé en: 6.4+
|
Ouverte | N/A | — | 6.4+ | |
|
CVE-2015-5909
N/A
Corrigé en: 6.4+
|
Ouverte | N/A | — | 6.4+ | |
|
CVE-2015-3187
N/A
Corrigé en: 7.2.1+
|
Ouverte | N/A | — | 7.2.1+ | |
|
CVE-2015-3184
N/A
Corrigé en: 7.2.1+
|
Ouverte | N/A | — | 7.2.1+ | |
|
CVE-2015-3185
N/A
|
Inconnu | N/A | — | — | |
|
CVE-2015-3027
N/A
Corrigé en: 6.2+
|
Corrigée | N/A | — | 6.2+ | |
|
CVE-2015-1149
N/A
Corrigé en: 6.2+
|
Corrigée | N/A | — | 6.2+ | |
|
CVE-2015-0251
N/A
|
Inconnu | N/A | — | — | |
|
CVE-2015-0248
N/A
|
Inconnu | N/A | — | — | |
|
CVE-2014-8108
N/A
|
Inconnu | N/A | — | — | |
|
CVE-2014-3580
N/A
|
Inconnu | N/A | — | — | |
|
CVE-2014-6394
N/A
|
Inconnu | N/A | — | — | |
|
CVE-2014-3522
N/A
|
Inconnu | N/A | — | — | |
|
CVE-2014-3528
N/A
|
Inconnu | N/A | — | — | |
|
CVE-2012-3698
N/A
|
Inconnu | N/A | — | — | |
|
CVE-2008-2318
N/A
|
Inconnu | N/A | — | — | |
|
CVE-2006-5327
N/A
Corrigé en: 2.2+
|
Corrigée | N/A | — | 2.2+ | |
|
CVE-2006-5328
N/A
Corrigé en: 2.2+
|
Corrigée | N/A | — | 2.2+ | |
|
CVE-2006-1466
N/A
Corrigé en: 2.2+
|
Corrigée | N/A | — | 2.2+ | |
|
CVE-2004-2687
N/A
|
Inconnu | N/A | — | — |
Score Sécurité
Préoccupant · 50/100
Composite : 50% CVE ouvertes + 40% KEV ouvertes + 10% vélocité vendor.
Voir le détail
- CVE ouvertes -50/-50 30 CVE
- KEV ouvertes 0/-40 0 KEV
- Vendor 0/-10 100% à jour
Contexte
Contexte
Description
Xcode offers the tools you need to develop, test, and distribute apps for Apple platforms, including predictive code completion, generative intelligence powered by the best coding models, advanced profiling and debugging tools, and simulators for Apple devices. It enables a unified workflow that spans from the earliest stages of app development to testing, debugging, optimization, and app distribution to testers and users. And with the Swift programming language, Xcode makes developing apps easy and fun. Simulator enables rapid prototyping and testing of your app in a simulated environment when a real device isn't available. Instruments helps you profile and analyze your app, improve performance, and investigate system resource usage. And you can use Icon Composer to design stunning layered icons out of Liquid Glass, Reality Composer Pro to create spatial content, train custom machine learning models with Create ML, and identify potential accessibility issues with Accessibility Inspector. To test or run applications on an Apple device, all you need is a free Apple Account. To submit your apps to the App Store, you must be a member of the Apple Developer Program. Some features ma…
Autres apps de l'éditeur
Apps publiées par Apple Distribution International
com.apple.cameracom.apple.ios.configuratorcom.apple.rsvpcom.apple.Musiccom.apple.music.classicalcom.apple.Fitness