📦 Tvos
by Apple
🔍 What is Tvos?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This CVE describes a UDP socket binding vulnerability in Apple operating systems where a UDP server socket bound to a local interface may unexpectedly become bound to all interfaces. This affects mult...
This vulnerability in Apple's Safari browser and related operating systems allows processing malicious web content to cause unexpected process crashes. It affects users of Safari, iOS, iPadOS, tvOS, w...
An input validation vulnerability in Apple operating systems allows attackers to execute arbitrary code or cause denial of service by sending specially crafted input. This affects users of visionOS, t...
This CVE describes an authorization bypass vulnerability in Apple operating systems that allows malicious apps to access sensitive user data without proper permissions. It affects multiple Apple platf...
This CVE describes memory corruption vulnerabilities in Apple's graphics processing that could allow arbitrary code execution. Attackers can exploit these flaws by tricking users into processing malic...
This is a critical out-of-bounds memory access vulnerability in Apple's Safari browser across multiple Apple operating systems. Processing malicious web content can cause Safari to crash unexpectedly,...
This CVE describes an input validation vulnerability in Apple operating systems that allows maliciously crafted files to cause unexpected app termination. The vulnerability affects visionOS, tvOS, mac...
This is a critical memory corruption vulnerability in Apple's file parsing components across multiple operating systems. Exploitation could allow arbitrary code execution when processing malicious fil...
This is a critical memory corruption vulnerability in Apple's media processing that allows remote code execution via malicious audio streams. Attackers can exploit it by tricking users into opening cr...
This vulnerability allows malicious applications to delete files they shouldn't have permission to access by exploiting improper symlink handling. It affects Apple devices running vulnerable versions ...
This vulnerability allows an app to enumerate a user's installed applications without proper authorization. It affects Apple devices running vulnerable versions of visionOS, tvOS, iPadOS, iOS, and mac...
This CVE describes an out-of-bounds read vulnerability in Apple's audio file processing that could allow unexpected app termination. Attackers could exploit this by tricking users into playing malicio...
A memory corruption vulnerability in Apple's video processing components allows attackers to cause unexpected app termination or corrupt process memory by tricking users into opening malicious video f...
This is a critical memory corruption vulnerability in Apple's video processing components across multiple operating systems. Processing a maliciously crafted video file can cause unexpected applicatio...
This vulnerability allows a malicious app to escape its sandbox restrictions on affected Apple operating systems, potentially gaining unauthorized access to system resources or other apps' data. It af...
This CVE describes a use-after-free vulnerability (CWE-416) in Apple operating systems that allows malicious applications to elevate privileges. It affects iOS, iPadOS, visionOS, macOS, watchOS, and t...
This is a critical memory corruption vulnerability in Apple's WebKit browser engine that affects multiple Apple operating systems and Safari. Processing malicious web content could allow attackers to ...
This vulnerability allows users to bypass web content restrictions through improper URL protocol handling in Apple operating systems and Safari. It affects users running vulnerable versions of tvOS, v...
This is a critical use-after-free vulnerability in Apple's WebKit browser engine that allows arbitrary code execution when processing malicious web content. It affects all Apple devices running outdat...
This vulnerability allows a remote attacker to cause unexpected app termination or execute arbitrary code on affected Apple devices. It affects multiple Apple operating systems including iOS, iPadOS, ...
A memory corruption vulnerability in Apple operating systems allows attackers with memory write capability to execute arbitrary code. This affects watchOS, tvOS, macOS, visionOS, iOS, and iPadOS versi...
This CVE describes a privacy vulnerability in Apple operating systems where an app could potentially identify what other apps a user has installed, exposing sensitive user data. It affects multiple Ap...
This CVE describes a logging vulnerability where sensitive user information was not properly redacted in system logs. Attackers with access to log files could potentially view private user data. The v...
This CVE describes a Bluetooth denial-of-service vulnerability affecting multiple Apple operating systems. An attacker in a privileged network position can send crafted Bluetooth packets to cause deni...
This CVE describes a sandbox escape vulnerability in multiple Apple operating systems where an app can bypass its security restrictions. It affects users of watchOS, tvOS, macOS, iOS, iPadOS, and visi...
A race condition vulnerability in Apple operating systems allows malicious applications to potentially gain root privileges. This affects users running vulnerable versions of iOS, iPadOS, macOS, watch...
This CVE describes an out-of-bounds memory access vulnerability in Apple's media file processing across multiple operating systems. Attackers can craft malicious media files that cause application cra...
A use-after-free vulnerability in Apple's WebKit browser engine allows processing malicious web content to execute arbitrary code. This affects multiple Apple operating systems and Safari browser vers...
This CVE describes a memory corruption vulnerability in Apple operating systems that could allow a malicious application to cause system crashes or write to kernel memory. It affects multiple Apple pl...
This CVE describes a memory corruption vulnerability in Apple operating systems that could allow a malicious application to manipulate shared memory between processes. The issue affects multiple Apple...
This vulnerability allows remote attackers to perform out-of-bounds memory access in ANGLE (Almost Native Graphics Layer Engine) in Google Chrome on macOS. Attackers can exploit this by tricking users...
This vulnerability allows an application to escape its sandbox restrictions on affected Apple operating systems. It affects users running vulnerable versions of tvOS, macOS, iOS, iPadOS, and visionOS....
An out-of-bounds memory access vulnerability in Apple's media file processing allows malicious media files to cause application crashes or memory corruption. This affects users of Apple's operating sy...
This CVE-2025-43361 is an out-of-bounds read vulnerability in Apple operating systems that allows malicious applications to read kernel memory. It affects multiple Apple platforms including iOS, iPadO...
This vulnerability allows apps to bypass entitlement checks and fingerprint users on Apple devices. It affects visionOS, tvOS, iOS, iPadOS, and watchOS before version 26. The issue enables unauthorize...
This CVE describes a sandbox escape vulnerability in Apple's mobile operating systems where an app can bypass its security restrictions. It affects iOS, iPadOS, tvOS, and watchOS users running vulnera...
An out-of-bounds memory access vulnerability in Apple's media processing components allows attackers to cause denial of service or potentially execute arbitrary code by tricking users into opening mal...
This vulnerability in Apple's WebKit browser engine allows malicious web content to bypass security controls and access sensitive user information. It affects Safari and all Apple operating systems th...
This vulnerability allows a remote attacker to cause unexpected system termination (crash/reboot) on affected Apple devices. It affects multiple Apple operating systems including iOS, iPadOS, tvOS, ma...
This memory corruption vulnerability in Apple's WebKit browser engine allows attackers to execute arbitrary code by tricking users into visiting malicious websites. It affects Safari and all Apple ope...
This is a memory corruption vulnerability in Apple's WebKit browser engine affecting multiple Apple operating systems. Processing malicious web content could allow attackers to execute arbitrary code ...
This memory corruption vulnerability in Apple's WebKit browser engine allows attackers to execute arbitrary code by tricking users into visiting malicious websites. It affects Safari and all Apple ope...
This memory corruption vulnerability in Apple's WebKit browser engine allows attackers to execute arbitrary code by tricking users into visiting malicious websites. It affects all Apple devices runnin...
This CVE describes a memory corruption vulnerability in Apple operating systems that could allow an attacker to cause system crashes or corrupt kernel memory. The issue affects multiple Apple platform...
This is a memory corruption vulnerability in Apple operating systems that could allow an attacker to cause system crashes or corrupt kernel memory. It affects multiple Apple platforms including iOS, m...
This CVE describes an integer overflow vulnerability in multiple Apple operating systems that could allow a remote attacker to leak memory. The vulnerability affects watchOS, macOS, tvOS, iPadOS, iOS,...
This is a memory corruption vulnerability in Apple's WebKit browser engine affecting multiple Apple operating systems and Safari. Processing malicious web content could allow attackers to execute arbi...
This is a cross-site request forgery (CSRF) vulnerability in Apple's WebKit browser engine that could allow memory corruption when processing malicious web content. It affects users of Apple devices a...
This CVE describes an authentication bypass vulnerability in multiple Apple operating systems where an attacker on the local network can circumvent authentication policies. The issue affects macOS, tv...
A use-after-free memory corruption vulnerability in Apple operating systems allows local network attackers to corrupt process memory. This affects macOS, iOS, iPadOS, tvOS, and visionOS. Successful ex...
This CVE describes a use-after-free vulnerability in Apple's WebKit browser engine that could allow arbitrary code execution when processing malicious web content. It affects multiple Apple operating ...
A validation logic vulnerability in multiple Apple operating systems allows remote attackers to cause denial-of-service conditions. This affects users running vulnerable versions of visionOS, macOS, t...
This memory handling vulnerability in Apple operating systems allows arbitrary code execution when processing malicious files. Attackers can exploit this to run unauthorized code on affected devices. ...
A type confusion vulnerability in Apple's WebKit browser engine could allow memory corruption when processing floating-point numbers. This affects users of Apple devices running vulnerable versions of...
This CVE describes a buffer overflow vulnerability in Apple's web content processing components. Attackers can cause unexpected process crashes by tricking users into visiting malicious websites. Affe...
This memory handling vulnerability in Apple's web content processing allows attackers to cause denial-of-service conditions. It affects users of Apple devices and software that process web content, in...
This vulnerability allows attackers to modify protected system files by restoring maliciously crafted backup files. It affects Apple devices running vulnerable versions of visionOS, watchOS, tvOS, mac...
A double free vulnerability in Apple operating systems allows malicious applications to execute arbitrary code with kernel privileges. This affects macOS, iOS, iPadOS, tvOS, and watchOS users running ...
This CVE describes a validation logic vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel privileges. This is a local privilege escalation vulnera...
This CVE describes a type confusion vulnerability in Apple operating systems that could allow a remote attacker to cause application crashes or execute arbitrary code. It affects multiple Apple platfo...
This CVE describes an image processing vulnerability in Apple operating systems where improper bounds checks could allow maliciously crafted images to disclose user information. The vulnerability affe...
This memory handling vulnerability in Apple operating systems allows an app to cause unexpected system termination (kernel panic/crash). All users running affected Apple operating systems before the p...
This memory handling vulnerability in Apple's image processing components allows disclosure of process memory when processing malicious images. It affects multiple Apple operating systems including iO...
This CVE describes a memory handling vulnerability in Apple's WebKit browser engine that affects multiple Apple operating systems and Safari. Processing malicious web content could cause unexpected pr...
This memory handling vulnerability in Apple operating systems allows processing malicious files to cause denial-of-service or memory disclosure. It affects multiple Apple platforms including iOS, macO...
This CVE describes an out-of-bounds memory access vulnerability in Apple operating systems that could allow an app to bypass Address Space Layout Randomization (ASLR). The vulnerability affects multip...
This vulnerability allows malicious websites to bypass same-origin policy protections and exfiltrate image data from other websites. It affects users of Apple's Safari browser and operating systems wi...
This memory handling vulnerability in Apple operating systems allows applications to cause unexpected system termination (kernel panic/crash). All users running affected Apple OS versions are vulnerab...
This CVE describes a symlink validation vulnerability in Apple operating systems that could allow malicious apps to bypass file system protections and access sensitive user data. The vulnerability aff...
This CVE describes an out-of-bounds memory access vulnerability in Apple's media file processing. Attackers can craft malicious media files that cause affected applications to crash or corrupt memory ...
This CVE describes an out-of-bounds memory access vulnerability in Apple's media file processing. Attackers can craft malicious media files that cause affected Apple devices to crash or corrupt memory...
This CVE describes an out-of-bounds memory access vulnerability in Apple's media file processing components. Attackers can craft malicious media files that cause affected applications to crash or corr...
This vulnerability allows an application to access sensitive user data due to insufficient access controls. It affects multiple Apple operating systems including iOS, iPadOS, macOS, tvOS, watchOS, and...
A logging vulnerability in Apple operating systems allows applications to access sensitive user data that should have been redacted. This affects users running visionOS, tvOS, iOS, iPadOS, and watchOS...
A type confusion vulnerability in Apple operating systems allows malicious apps to cause denial-of-service conditions by exploiting memory handling flaws. This affects users running vulnerable version...
This vulnerability allows malicious websites to access device sensor data (like motion, orientation, or environmental sensors) without obtaining user permission. It affects Apple devices running vulne...
An out-of-bounds memory access vulnerability in Apple media file processing allows attackers to cause application crashes or corrupt process memory by tricking users into opening malicious media files...
An out-of-bounds write vulnerability in Apple operating systems allows malicious apps to write beyond allocated memory boundaries, potentially causing system crashes or unexpected termination. This af...
This CVE describes a logging vulnerability in Apple operating systems where sensitive user data may not be properly redacted in logs. An application could potentially access this sensitive information...
This vulnerability allows an attacker to read memory outside the intended buffer when processing a malicious image. It affects Apple devices running vulnerable versions of watchOS, iOS, iPadOS, tvOS, ...
A memory handling vulnerability in Apple WebKit (CWE-119) allows malicious web content to cause Safari to crash unexpectedly. This affects users of Safari and Apple operating systems before the patche...
This CVE describes a memory handling vulnerability in Apple's Safari browser and related WebKit components across multiple Apple operating systems. Processing malicious web content could cause Safari ...
A use-after-free vulnerability in Apple's Safari browser and related WebKit components allows attackers to cause unexpected crashes by processing malicious web content. This affects users of Safari on...
This CVE describes a permissions vulnerability in Apple operating systems that allows applications to modify protected areas of the file system. The issue affects multiple Apple platforms including iO...
A memory handling vulnerability in Apple operating systems allows an app to cause unexpected system termination (crash/reboot). This affects users of visionOS, iOS, iPadOS, macOS, watchOS, and tvOS wh...
This vulnerability allows processing a maliciously crafted media file to cause unexpected app termination or corrupt process memory. It affects Apple devices running outdated versions of watchOS, macO...
This CVE describes a memory handling vulnerability in Apple's WebKit browser engine that could cause Safari to crash when processing malicious web content. It affects multiple Apple operating systems ...
A use-after-free vulnerability in Apple operating systems allows parsing malicious files to cause unexpected application termination. This affects users of watchOS, macOS, tvOS, iPadOS, iOS, and visio...
An out-of-bounds read vulnerability in Apple operating systems allows attackers to disclose user information by parsing malicious files. This affects users running vulnerable versions of iOS, iPadOS, ...
This vulnerability allows malicious apps to access sensitive user data on Apple devices due to improper state management. It affects users running older versions of iOS, iPadOS, macOS, watchOS, tvOS, ...
A logic vulnerability in Apple operating systems allows attackers in privileged network positions to intercept network traffic. This affects multiple Apple platforms including iOS, macOS, watchOS, tvO...
This CVE describes an information disclosure vulnerability in Apple operating systems where an app could identify what other apps a user has installed. It affects users of iOS, iPadOS, watchOS, macOS,...
This vulnerability involves memory corruption issues in Apple's operating systems that could allow a malicious HID (Human Interface Device) to cause unexpected process crashes. It affects multiple App...
This CVE describes a race condition vulnerability in Apple's web content processing that could allow an attacker to cause unexpected process crashes. It affects multiple Apple operating systems and Sa...