CVSS Base Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Detection Type: Executable
Summary: This host is installed with Apple Xcode
and is prone to an arbitrary code execution vulnerability.
Detection Method: Checks if a vulnerable version is present
on the target host.
Technical Details: The flaw is due to a memory corruption issue
related to improper input validation.
Impact: Successful exploitation will allow
remote attackers to conduct arbitrary code execution.
Affected Versions: Apple Xcode prior to version 11.2
Recommendations: Upgrade to Apple Xcode 11.2 or later.
Please see the references for more information.
Solution Type: Vendor Patch
Mageni can help you to find out if you have this or more vulnerabilities exposing you to hackers, ransomware and malware: Download Mageni's Free Edition
Fedora Update for community-mysql FEDORA-2019-c1fab3f139
Fedora Update for java-latest-openjdk FEDORA-2019-119312dbfc
Fedora Update for golang FEDORA-2019-34e097c66c
Fedora Update for community-mysql FEDORA-2019-48a0a07033
Fedora Update for aspell FEDORA-2019-73919e71f8
Fedora Update for crun FEDORA-2019-80a2646798
Fedora Update for mupdf FEDORA-2019-10f02ad597
Debian LTS Advisory ([SECURITY] [DLA 1988-1] ampache security update)
Debian Security Advisory DSA 4562-1 (chromium - security update)
Smartweares HOME easy Information Disclosure Vulnerability
Mageni provides a free vulnerability scanning and management platform which helps you need to find, prioritize, remediate and manage your vulnerabilities.