📦 Ipados
by Apple
🔍 What is Ipados?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This CVE describes a race condition vulnerability in Apple operating systems that allows shortcuts to bypass sandbox restrictions through improper handling of symbolic links. Attackers could potential...
This CVE describes an authentication bypass vulnerability in Apple's Photos app where unauthorized users can view photos in the Hidden Photos Album without proper authentication. It affects users of v...
This CVE describes a UDP socket binding vulnerability in Apple operating systems where a UDP server socket bound to a local interface may unexpectedly become bound to all interfaces. This affects mult...
This vulnerability in Apple's Safari browser and related operating systems allows processing malicious web content to cause unexpected process crashes. It affects users of Safari, iOS, iPadOS, tvOS, w...
An input validation vulnerability in Apple operating systems allows attackers to execute arbitrary code or cause denial of service by sending specially crafted input. This affects users of visionOS, t...
This CVE describes an authorization bypass vulnerability in Apple operating systems that allows malicious apps to access sensitive user data without proper permissions. It affects multiple Apple platf...
This CVE describes memory corruption vulnerabilities in Apple's graphics processing that could allow arbitrary code execution. Attackers can exploit these flaws by tricking users into processing malic...
This vulnerability allows malicious applications to bypass symlink validation and access protected user data on Apple devices. It affects users running vulnerable versions of iPadOS, macOS Sequoia, ma...
A use-after-free vulnerability (CWE-416) in Apple operating systems allows attackers to cause unexpected application termination. This affects macOS and iPadOS users running vulnerable versions. Succe...
This is a critical out-of-bounds memory access vulnerability in Apple's Safari browser across multiple Apple operating systems. Processing malicious web content can cause Safari to crash unexpectedly,...
This CVE describes a permissions issue in Apple operating systems that allows applications to fingerprint users. The vulnerability affects macOS, iPadOS, and iOS systems, potentially exposing user ide...
This CVE describes an input validation vulnerability in Apple operating systems that allows maliciously crafted files to cause unexpected app termination. The vulnerability affects visionOS, tvOS, mac...
This is a critical memory corruption vulnerability in Apple's file parsing components across multiple operating systems. Exploitation could allow arbitrary code execution when processing malicious fil...
This vulnerability allows VoiceOver, Apple's screen reader accessibility feature, to audibly read device passcodes when enabled. This affects iOS and iPadOS users with VoiceOver active, potentially ex...
This vulnerability allows malicious websites to bypass the Same Origin Policy in Apple's Safari browser and related WebKit-based browsers. This could enable cross-site data theft or session hijacking....
This vulnerability allows an attacker to enable iCloud folder sharing without proper authentication. It affects multiple Apple operating systems including macOS, iOS, iPadOS, and visionOS. Users with ...
This vulnerability allows attackers to use Siri voice commands on locked iOS/iPadOS devices to enable Auto-Answer Calls, potentially allowing unauthorized call interception. It affects Apple iOS and i...
This is a critical memory corruption vulnerability in Apple's media processing that allows remote code execution via malicious audio streams. Attackers can exploit it by tricking users into opening cr...
This vulnerability allows malicious applications to delete files they shouldn't have permission to access by exploiting improper symlink handling. It affects Apple devices running vulnerable versions ...
This CVE describes a permissions bypass vulnerability in Apple's Shortcuts app across multiple macOS and iPadOS versions. It allows malicious shortcuts to access files that should be restricted from t...
A memory corruption vulnerability in Apple operating systems allows attackers with memory write capability to execute arbitrary code. This affects watchOS, tvOS, macOS, visionOS, iOS, and iPadOS versi...
This CVE describes a sandbox escape vulnerability in Apple operating systems where a malicious app could bypass security restrictions designed to isolate it from other apps and system resources. All u...
This CVE describes a memory handling vulnerability in Apple operating systems and Safari that could allow a remote attacker to cause denial-of-service. The issue affects macOS, iOS, iPadOS, visionOS, ...
This CVE describes a path handling vulnerability (CWE-22) in multiple Apple operating systems and Safari that allows a remote attacker to write arbitrary files to affected systems. The vulnerability a...
This CVE describes a privacy vulnerability in Apple operating systems where an app could potentially identify what other apps a user has installed, exposing sensitive user data. It affects multiple Ap...
This CVE describes a logging vulnerability where sensitive user information was not properly redacted in system logs. Attackers with access to log files could potentially view private user data. The v...
This CVE describes a Bluetooth denial-of-service vulnerability affecting multiple Apple operating systems. An attacker in a privileged network position can send crafted Bluetooth packets to cause deni...
This vulnerability allows a malicious application to gain root privileges on affected Apple devices. It affects macOS, iOS, iPadOS, and visionOS systems running vulnerable versions. Attackers could ex...
This CVE describes a sandbox escape vulnerability in multiple Apple operating systems where an app can bypass its security restrictions. It affects users of watchOS, tvOS, macOS, iOS, iPadOS, and visi...
A path validation vulnerability in Apple operating systems allows malicious applications to gain root privileges through improper path handling. This affects iOS, iPadOS, macOS, and visionOS users run...
A race condition vulnerability in Apple operating systems allows malicious applications to potentially gain root privileges. This affects users running vulnerable versions of iOS, iPadOS, macOS, watch...
This vulnerability allows applications to bypass certain privacy preferences on Apple operating systems, potentially accessing sensitive user data without proper authorization. It affects macOS, iOS, ...
This CVE describes an out-of-bounds memory access vulnerability in Apple's media file processing across multiple operating systems. Attackers can craft malicious media files that cause application cra...
This vulnerability allows malicious apps to corrupt coprocessor memory on Apple iOS and iPadOS devices. It affects users running iOS/iPadOS versions before 18.1, potentially enabling privilege escalat...
A use-after-free vulnerability in Apple's WebKit browser engine allows processing malicious web content to execute arbitrary code. This affects multiple Apple operating systems and Safari browser vers...
This CVE describes a memory corruption vulnerability in Apple operating systems that could allow a malicious application to cause system crashes or write to kernel memory. It affects multiple Apple pl...
A mail header parsing vulnerability in Apple operating systems allows attackers to cause persistent denial-of-service conditions. This affects users of iOS, iPadOS, macOS, watchOS, and visionOS who pr...
This CVE describes a memory corruption vulnerability in Apple operating systems that could allow a malicious application to manipulate shared memory between processes. The issue affects multiple Apple...
This vulnerability allows remote attackers to perform out-of-bounds memory access in ANGLE (Almost Native Graphics Layer Engine) in Google Chrome on macOS. Attackers can exploit this by tricking users...
A use-after-free vulnerability in Apple's WebKit browser engine allows memory corruption when processing malicious web content. This affects users of macOS, iOS, iPadOS, and Safari who visit compromis...
This CVE describes a privacy vulnerability in Apple operating systems where applications could bypass user preference controls to access sensitive user data. The issue affects iOS, iPadOS, watchOS, ma...
This CVE describes a privacy bypass vulnerability in Apple operating systems where applications can circumvent certain privacy preferences, potentially accessing sensitive data they shouldn't. It affe...
This vulnerability allows remote content to be loaded even when the 'Load Remote Images' setting is disabled in affected Apple operating systems. This bypasses user privacy controls and could lead to ...
This vulnerability allows an application to escape its sandbox restrictions on affected Apple operating systems. It affects users running vulnerable versions of tvOS, macOS, iOS, iPadOS, and visionOS....
This vulnerability allows sandboxed applications on Apple operating systems to observe system-wide network connections, potentially exposing sensitive network traffic information. It affects multiple ...
An out-of-bounds memory access vulnerability in Apple's media file processing allows malicious media files to cause application crashes or memory corruption. This affects users of Apple's operating sy...
This vulnerability allows remote attackers to view leaked DNS queries when Apple's Private Relay feature is enabled. It affects users of Safari, iOS, iPadOS, tvOS, watchOS, and visionOS with Private R...
This CVE-2025-43361 is an out-of-bounds read vulnerability in Apple operating systems that allows malicious applications to read kernel memory. It affects multiple Apple platforms including iOS, iPadO...
This vulnerability allows attackers to cause denial of service or memory corruption by tricking users into opening malicious media files. It affects macOS users running vulnerable versions who process...
This vulnerability allows apps to bypass entitlement checks and fingerprint users on Apple devices. It affects visionOS, tvOS, iOS, iPadOS, and watchOS before version 26. The issue enables unauthorize...
A sandbox bypass vulnerability in Apple's macOS and iOS/iPadOS allows shortcuts to escape security restrictions. This affects users running vulnerable versions of these operating systems, potentially ...
This CVE describes a sandbox escape vulnerability in Apple's mobile operating systems where an app can bypass its security restrictions. It affects iOS, iPadOS, tvOS, and watchOS users running vulnera...
An out-of-bounds memory access vulnerability in Apple's media processing components allows attackers to cause denial of service or potentially execute arbitrary code by tricking users into opening mal...
This vulnerability in Apple's WebKit browser engine allows malicious web content to bypass security controls and access sensitive user information. It affects Safari and all Apple operating systems th...
This vulnerability allows a remote attacker to cause unexpected system termination (crash/reboot) on affected Apple devices. It affects multiple Apple operating systems including iOS, iPadOS, tvOS, ma...
This memory corruption vulnerability in Apple's WebKit browser engine allows attackers to execute arbitrary code by tricking users into visiting malicious websites. It affects Safari and all Apple ope...
This is a memory corruption vulnerability in Apple's WebKit browser engine affecting multiple Apple operating systems. Processing malicious web content could allow attackers to execute arbitrary code ...
This vulnerability in Google Chrome's ANGLE and GPU components allows insufficient input validation, enabling a remote attacker to potentially escape the browser sandbox via a malicious HTML page. All...
This memory corruption vulnerability in Apple's WebKit browser engine allows attackers to execute arbitrary code by tricking users into visiting malicious websites. It affects Safari and all Apple ope...
This vulnerability in iOS/iPadOS FaceTime allows audio to continue transmitting even when the microphone is muted during calls. This affects users of Apple devices running vulnerable iOS/iPadOS versio...
This CVE describes an authorization vulnerability in iOS and iPadOS that allows malicious apps to bypass access controls and read sensitive user data. The vulnerability affects iOS/iPadOS versions bef...
This CVE describes a macOS/iOS/iPadOS vulnerability where sandboxed applications can bypass security restrictions to access sensitive user data. The issue affects multiple Apple operating system versi...
A logic flaw in iOS/iPadOS note management could allow attackers to access users' deleted notes. This affects users running vulnerable versions of iOS and iPadOS who have used the Notes app. The vulne...
A logic flaw in Apple's mail preview functionality allows remote content to load despite the 'Load remote content in messages' setting being disabled. This affects users of macOS, iOS, and iPadOS who ...
This CVE describes a privacy vulnerability in iOS/iPadOS where an attacker with physical access to a locked device could view sensitive user information. The issue affects users with devices running v...
This CVE describes an image processing vulnerability in Apple operating systems where improper bounds checks could allow maliciously crafted images to disclose user information. The vulnerability affe...
This vulnerability allows malicious websites to track users through Safari web extensions due to improper state management. It affects users of Apple's Safari browser across multiple Apple operating s...
A path validation vulnerability in Apple operating systems allows applications to access sensitive user data through improper directory path parsing. This affects macOS, iOS, iPadOS, and visionOS user...
This memory handling vulnerability in Apple operating systems allows an app to cause unexpected system termination (kernel panic/crash). All users running affected Apple operating systems before the p...
An authorization vulnerability in iOS and iPadOS allows attackers with physical access to a locked device to view sensitive user information. This affects users running vulnerable versions of iOS/iPad...
An authorization vulnerability in iOS and iPadOS allows attackers with physical access to a locked device to view sensitive user information. This affects users running vulnerable versions of iOS/iPad...
An attacker with physical access to an iPhone can take and view screenshots of sensitive data during iPhone Mirroring with a Mac. This vulnerability affects iPhone users who use iPhone Mirroring featu...
This memory handling vulnerability in Apple's WebKit browser engine allows processing malicious web content to cause unexpected process crashes. It affects users of macOS, iOS, iPadOS, visionOS, and S...
This CVE describes a user interface inconsistency vulnerability in Apple iOS and iPadOS that allows an attacker with physical access to a locked device to potentially view sensitive user information. ...
This CVE describes an environment variable handling vulnerability in Apple operating systems that could allow malicious apps to access sensitive user data. The issue affects multiple Apple platforms i...
This memory handling vulnerability in Apple's image processing components allows disclosure of process memory when processing malicious images. It affects multiple Apple operating systems including iO...
This CVE describes a memory handling vulnerability in Apple's WebKit browser engine that affects multiple Apple operating systems and Safari. Processing malicious web content could cause unexpected pr...
This memory handling vulnerability in Apple's WebKit browser engine allows processing malicious web content to cause unexpected process crashes. It affects users of iOS, iPadOS, Safari, macOS, and vis...
This vulnerability allows identifying information to leak to Live Caller ID app extensions even when those extensions are disabled. It affects iOS and iPadOS users who have disabled Live Caller ID ext...
An out-of-bounds write vulnerability in USD file processing allows attackers to cause unexpected app termination or potentially execute arbitrary code by tricking users into opening malicious USD file...
This CVE describes a memory corruption vulnerability in Apple operating systems that allows an app to cause system crashes or corrupt kernel memory. It affects multiple macOS, iOS, iPadOS, and visionO...
This memory handling vulnerability in Apple operating systems allows malicious applications to crash system processes. It affects macOS, iOS, and iPadOS users running vulnerable versions. The issue ha...
This CVE describes a memory management vulnerability in Apple's WebKit browser engine that could cause unexpected process crashes when processing malicious web content. It affects multiple Apple opera...
This memory handling vulnerability in Apple operating systems allows processing malicious files to cause denial-of-service or memory disclosure. It affects multiple Apple platforms including iOS, macO...
A buffer overflow vulnerability in macOS and iOS/iPadOS allows malicious USB HID devices to cause unexpected process crashes. This affects users of macOS Sequoia, Sonoma, iOS 18, and iPadOS 18 before ...
A path handling vulnerability in iOS/iPadOS backup restoration allows malicious backup files to modify protected system files. This affects users who restore backups from untrusted sources on vulnerab...
This vulnerability allows a malicious HID (Human Interface Device) to cause unexpected process crashes on affected Apple systems. It affects macOS, iOS, and iPadOS users who connect untrusted USB or B...
This vulnerability allows a malicious Human Interface Device (HID) like a keyboard or mouse to cause unexpected process crashes on affected Apple systems. It affects macOS and iOS/iPadOS users who con...
A buffer overflow vulnerability in macOS and iOS/iPadOS allows malicious HID devices to cause unexpected process crashes. This affects users of macOS Sequoia, Sonoma, iOS 18, and iPadOS 18 before spec...
A buffer overflow vulnerability in macOS and iOS/iPadOS allows a malicious HID (Human Interface Device) to cause unexpected process crashes. This affects users of macOS Sequoia, Sonoma, iOS 18, and iP...
A logic vulnerability in Apple operating systems allows attackers in privileged network positions to intercept network traffic. This affects multiple Apple platforms including iOS, macOS, watchOS, tvO...
A logic vulnerability in Apple's iOS, iPadOS, Safari, and macOS allows malicious applications to access a user's Safari browsing history without proper authorization. This affects users running outdat...
This vulnerability allows malicious apps to enumerate a user's installed applications on iOS and iPadOS devices. It affects users running vulnerable versions of iOS and iPadOS who install untrusted ap...
An input validation vulnerability in iOS/iPadOS allows someone with physical access to a locked device to view photos from the lock screen. This affects iOS/iPadOS devices before version 26.3. The vul...
This vulnerability allows a user to view restricted content from the lock screen on Apple iOS and iPadOS devices due to improper state management. It affects users running vulnerable versions of iOS/i...
This CVE describes an information disclosure vulnerability in iOS/iPadOS where malicious apps could enumerate which other apps are installed on a device. This affects users running iOS/iPadOS versions...
A macOS, iOS, iPadOS, and watchOS vulnerability allows applications to access a user's Safari browsing history due to insufficient data redaction in logging. This affects users running vulnerable vers...
This CVE describes an information disclosure vulnerability in Apple operating systems where an app could identify what other apps a user has installed. It affects users of iOS, iPadOS, watchOS, macOS,...
This vulnerability involves memory corruption issues in Apple's operating systems that could allow a malicious HID (Human Interface Device) to cause unexpected process crashes. It affects multiple App...
This CVE describes a race condition vulnerability in Apple's web content processing that could allow an attacker to cause unexpected process crashes. It affects multiple Apple operating systems and Sa...