📦 Watchos
by Apple
🔍 What is Watchos?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This CVE describes a UDP socket binding vulnerability in Apple operating systems where a UDP server socket bound to a local interface may unexpectedly become bound to all interfaces. This affects mult...
This vulnerability in Apple's Safari browser and related operating systems allows processing malicious web content to cause unexpected process crashes. It affects users of Safari, iOS, iPadOS, tvOS, w...
An input validation vulnerability in Apple operating systems allows attackers to execute arbitrary code or cause denial of service by sending specially crafted input. This affects users of visionOS, t...
This CVE describes an authorization bypass vulnerability in Apple operating systems that allows malicious apps to access sensitive user data without proper permissions. It affects multiple Apple platf...
This CVE describes memory corruption vulnerabilities in Apple's graphics processing that could allow arbitrary code execution. Attackers can exploit these flaws by tricking users into processing malic...
This is a critical out-of-bounds memory access vulnerability in Apple's Safari browser across multiple Apple operating systems. Processing malicious web content can cause Safari to crash unexpectedly,...
This is a critical memory corruption vulnerability in Apple's file parsing components across multiple operating systems. Exploitation could allow arbitrary code execution when processing malicious fil...
This is a critical memory corruption vulnerability in Apple's media processing that allows remote code execution via malicious audio streams. Attackers can exploit it by tricking users into opening cr...
This critical vulnerability allows malicious web content to break out of the Web Content sandbox via an out-of-bounds write issue, potentially enabling arbitrary code execution. It affects Apple devic...
This CVE describes an authentication bypass vulnerability in Apple's Private Browsing feature across multiple platforms. Attackers could access Private Browsing tabs without proper authentication, pot...
This CVE describes a use-after-free vulnerability (CWE-416) in Apple operating systems that allows malicious applications to elevate privileges. It affects iOS, iPadOS, visionOS, macOS, watchOS, and t...
This vulnerability allows password autofill to fill passwords even after authentication fails, potentially exposing credentials. It affects users of Apple's operating systems who use password autofill...
A system binary vulnerability in Apple operating systems could allow an attacker to fingerprint a user's Apple Account, potentially revealing account details or activity. This affects users of iOS, iP...
This is a critical memory corruption vulnerability in Apple's WebKit browser engine that affects multiple Apple operating systems and Safari. Processing malicious web content could allow attackers to ...
This is a critical use-after-free vulnerability in Apple's WebKit browser engine that allows arbitrary code execution when processing malicious web content. It affects all Apple devices running outdat...
This vulnerability allows a remote attacker to cause unexpected app termination or execute arbitrary code on affected Apple devices. It affects multiple Apple operating systems including iOS, iPadOS, ...
This is a critical kernel privilege escalation vulnerability in Apple operating systems. An out-of-bounds write allows malicious apps to execute arbitrary code with kernel privileges, potentially taki...
This is a critical kernel privilege escalation vulnerability in multiple Apple operating systems. An attacker can exploit memory handling flaws to execute arbitrary code with kernel privileges, potent...
This CVE-2023-38598 is a use-after-free vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel privileges. It affects multiple Apple platforms includ...
This is a critical use-after-free vulnerability in Apple operating systems that allows remote attackers to cause application crashes or execute arbitrary code. It affects multiple Apple platforms incl...
A memory corruption vulnerability in Apple operating systems allows attackers with memory write capability to execute arbitrary code. This affects watchOS, tvOS, macOS, visionOS, iOS, and iPadOS versi...
This CVE describes a sandbox escape vulnerability in Apple operating systems where a malicious app could bypass security restrictions designed to isolate it from other apps and system resources. All u...
This CVE describes a privacy vulnerability in Apple operating systems where an app could potentially identify what other apps a user has installed, exposing sensitive user data. It affects multiple Ap...
This CVE describes a logging vulnerability where sensitive user information was not properly redacted in system logs. Attackers with access to log files could potentially view private user data. The v...
This CVE describes a Bluetooth denial-of-service vulnerability affecting multiple Apple operating systems. An attacker in a privileged network position can send crafted Bluetooth packets to cause deni...
This CVE describes a sandbox escape vulnerability in multiple Apple operating systems where an app can bypass its security restrictions. It affects users of watchOS, tvOS, macOS, iOS, iPadOS, and visi...
A race condition vulnerability in Apple operating systems allows malicious applications to potentially gain root privileges. This affects users running vulnerable versions of iOS, iPadOS, macOS, watch...
This CVE describes an out-of-bounds memory access vulnerability in Apple's media file processing across multiple operating systems. Attackers can craft malicious media files that cause application cra...
A use-after-free vulnerability in Apple's WebKit browser engine allows processing malicious web content to execute arbitrary code. This affects multiple Apple operating systems and Safari browser vers...
This CVE describes a memory corruption vulnerability in Apple operating systems that could allow a malicious application to cause system crashes or write to kernel memory. It affects multiple Apple pl...
A mail header parsing vulnerability in Apple operating systems allows attackers to cause persistent denial-of-service conditions. This affects users of iOS, iPadOS, macOS, watchOS, and visionOS who pr...
This CVE describes a memory corruption vulnerability in Apple operating systems that could allow a malicious application to manipulate shared memory between processes. The issue affects multiple Apple...
This vulnerability allows remote attackers to perform out-of-bounds memory access in ANGLE (Almost Native Graphics Layer Engine) in Google Chrome on macOS. Attackers can exploit this by tricking users...
This CVE describes a privacy vulnerability in Apple operating systems where applications could bypass user preference controls to access sensitive user data. The issue affects iOS, iPadOS, watchOS, ma...
This vulnerability allows remote content to be loaded even when the 'Load Remote Images' setting is disabled in affected Apple operating systems. This bypasses user privacy controls and could lead to ...
This vulnerability allows sandboxed applications on Apple operating systems to observe system-wide network connections, potentially exposing sensitive network traffic information. It affects multiple ...
This vulnerability allows remote attackers to view leaked DNS queries when Apple's Private Relay feature is enabled. It affects users of Safari, iOS, iPadOS, tvOS, watchOS, and visionOS with Private R...
This CVE-2025-43361 is an out-of-bounds read vulnerability in Apple operating systems that allows malicious applications to read kernel memory. It affects multiple Apple platforms including iOS, iPadO...
This vulnerability allows apps to bypass entitlement checks and fingerprint users on Apple devices. It affects visionOS, tvOS, iOS, iPadOS, and watchOS before version 26. The issue enables unauthorize...
This CVE describes a sandbox escape vulnerability in Apple's mobile operating systems where an app can bypass its security restrictions. It affects iOS, iPadOS, tvOS, and watchOS users running vulnera...
This vulnerability in Apple's WebKit browser engine allows malicious web content to bypass security controls and access sensitive user information. It affects Safari and all Apple operating systems th...
This vulnerability allows a remote attacker to cause unexpected system termination (crash/reboot) on affected Apple devices. It affects multiple Apple operating systems including iOS, iPadOS, tvOS, ma...
This memory corruption vulnerability in Apple's WebKit browser engine allows attackers to execute arbitrary code by tricking users into visiting malicious websites. It affects Safari and all Apple ope...
This is a memory corruption vulnerability in Apple's WebKit browser engine affecting multiple Apple operating systems. Processing malicious web content could allow attackers to execute arbitrary code ...
This vulnerability in Google Chrome's ANGLE and GPU components allows insufficient input validation, enabling a remote attacker to potentially escape the browser sandbox via a malicious HTML page. All...
This memory corruption vulnerability in Apple's WebKit browser engine allows attackers to execute arbitrary code by tricking users into visiting malicious websites. It affects Safari and all Apple ope...
This memory corruption vulnerability in Apple's WebKit browser engine allows attackers to execute arbitrary code by tricking users into visiting malicious websites. It affects all Apple devices runnin...
This is a memory corruption vulnerability in Apple operating systems that could allow an attacker to cause system crashes or corrupt kernel memory. It affects multiple Apple platforms including iOS, m...
This CVE describes an integer overflow vulnerability in multiple Apple operating systems that could allow a remote attacker to leak memory. The vulnerability affects watchOS, macOS, tvOS, iPadOS, iOS,...
This is a memory corruption vulnerability in Apple's WebKit browser engine affecting multiple Apple operating systems and Safari. Processing malicious web content could allow attackers to execute arbi...
This is a cross-site request forgery (CSRF) vulnerability in Apple's WebKit browser engine that could allow memory corruption when processing malicious web content. It affects users of Apple devices a...
This CVE describes a use-after-free vulnerability in Apple's WebKit browser engine that could allow arbitrary code execution when processing malicious web content. It affects multiple Apple operating ...
This memory handling vulnerability in Apple's web content processing allows attackers to cause denial-of-service conditions. It affects users of Apple devices and software that process web content, in...
This vulnerability allows attackers to modify protected system files by restoring maliciously crafted backup files. It affects Apple devices running vulnerable versions of visionOS, watchOS, tvOS, mac...
A double free vulnerability in Apple operating systems allows malicious applications to execute arbitrary code with kernel privileges. This affects macOS, iOS, iPadOS, tvOS, and watchOS users running ...
This CVE describes a validation logic vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel privileges. This is a local privilege escalation vulnera...
This CVE describes a type confusion vulnerability in Apple operating systems that could allow a remote attacker to cause application crashes or execute arbitrary code. It affects multiple Apple platfo...
This CVE describes an input validation vulnerability in multiple Apple operating systems that could allow an attacker on the local network to cause system crashes or memory corruption. The vulnerabili...
A type confusion vulnerability in Apple operating systems allows remote attackers to cause unexpected application termination. This affects users running vulnerable versions of visionOS, iOS, iPadOS, ...
A permissions vulnerability in Apple operating systems allows malicious applications to escalate privileges to root access. This affects macOS, tvOS, watchOS, iOS, and iPadOS users running vulnerable ...
This CVE describes an image processing vulnerability in Apple operating systems where improper bounds checks could allow maliciously crafted images to disclose user information. The vulnerability affe...
This memory handling vulnerability in Apple operating systems allows an app to cause unexpected system termination (kernel panic/crash). All users running affected Apple operating systems before the p...
This CVE describes an environment variable handling vulnerability in Apple operating systems that could allow malicious apps to access sensitive user data. The issue affects multiple Apple platforms i...
This memory handling vulnerability in Apple's image processing components allows disclosure of process memory when processing malicious images. It affects multiple Apple operating systems including iO...
This CVE describes a memory handling vulnerability in Apple's WebKit browser engine that affects multiple Apple operating systems and Safari. Processing malicious web content could cause unexpected pr...
This memory handling vulnerability in Apple operating systems allows processing malicious files to cause denial-of-service or memory disclosure. It affects multiple Apple platforms including iOS, macO...
A permissions vulnerability in Apple operating systems allows applications to access sensitive payment tokens without proper authorization. This affects visionOS, iOS, iPadOS, watchOS, and macOS users...
This vulnerability allows an attacker in physical proximity to cause an out-of-bounds read in kernel memory on Apple devices. It affects multiple Apple operating systems including iOS, iPadOS, macOS, ...
This CVE describes an out-of-bounds memory access vulnerability in Apple operating systems that could allow an app to bypass Address Space Layout Randomization (ASLR). The vulnerability affects multip...
This CVE describes a user interface spoofing vulnerability in Apple operating systems and Safari browser. Visiting a malicious website could allow attackers to present fake interface elements, potenti...
This CVE describes a privacy vulnerability in Apple operating systems where applications could fingerprint users by accessing sensitive data. The issue affects multiple Apple platforms including iOS, ...
This vulnerability allows malicious websites to bypass same-origin policy protections and exfiltrate image data from other websites. It affects users of Apple's Safari browser and operating systems wi...
This memory handling vulnerability in Apple operating systems allows applications to cause unexpected system termination (kernel panic/crash). All users running affected Apple OS versions are vulnerab...
This CVE describes a symlink validation vulnerability in Apple operating systems that could allow malicious apps to bypass file system protections and access sensitive user data. The vulnerability aff...
This vulnerability allows an application to access sensitive user data due to insufficient access controls. It affects multiple Apple operating systems including iOS, iPadOS, macOS, tvOS, watchOS, and...
A logging vulnerability in Apple operating systems allows applications to access sensitive user data that should have been redacted. This affects users running visionOS, tvOS, iOS, iPadOS, and watchOS...
A type confusion vulnerability in Apple operating systems allows malicious apps to cause denial-of-service conditions by exploiting memory handling flaws. This affects users running vulnerable version...
This vulnerability allows malicious websites to access device sensor data (like motion, orientation, or environmental sensors) without obtaining user permission. It affects Apple devices running vulne...
An out-of-bounds memory access vulnerability in Apple media file processing allows attackers to cause application crashes or corrupt process memory by tricking users into opening malicious media files...
An out-of-bounds write vulnerability in Apple operating systems allows malicious apps to write beyond allocated memory boundaries, potentially causing system crashes or unexpected termination. This af...
This CVE describes a logging vulnerability in Apple operating systems where sensitive user data may not be properly redacted in logs. An application could potentially access this sensitive information...
This vulnerability allows an attacker to read memory outside the intended buffer when processing a malicious image. It affects Apple devices running vulnerable versions of watchOS, iOS, iPadOS, tvOS, ...
A memory handling vulnerability in Apple WebKit (CWE-119) allows malicious web content to cause Safari to crash unexpectedly. This affects users of Safari and Apple operating systems before the patche...
This CVE describes a memory handling vulnerability in Apple's Safari browser and related WebKit components across multiple Apple operating systems. Processing malicious web content could cause Safari ...
A use-after-free vulnerability in Apple's Safari browser and related WebKit components allows attackers to cause unexpected crashes by processing malicious web content. This affects users of Safari on...
This CVE describes a permissions vulnerability in Apple operating systems that allows applications to modify protected areas of the file system. The issue affects multiple Apple platforms including iO...
A memory handling vulnerability in Apple operating systems allows an app to cause unexpected system termination (crash/reboot). This affects users of visionOS, iOS, iPadOS, macOS, watchOS, and tvOS wh...
This vulnerability allows processing a maliciously crafted media file to cause unexpected app termination or corrupt process memory. It affects Apple devices running outdated versions of watchOS, macO...
This CVE describes a memory handling vulnerability in Apple's WebKit browser engine that could cause Safari to crash when processing malicious web content. It affects multiple Apple operating systems ...
A use-after-free vulnerability in Apple operating systems allows parsing malicious files to cause unexpected application termination. This affects users of watchOS, macOS, tvOS, iPadOS, iOS, and visio...
A logic vulnerability in Apple operating systems allows attackers in privileged network positions to intercept network traffic. This affects multiple Apple platforms including iOS, macOS, watchOS, tvO...
A macOS, iOS, iPadOS, and watchOS vulnerability allows applications to access a user's Safari browsing history due to insufficient data redaction in logging. This affects users running vulnerable vers...
This CVE describes an information disclosure vulnerability in Apple operating systems where an app could identify what other apps a user has installed. It affects users of iOS, iPadOS, watchOS, macOS,...
This vulnerability involves memory corruption issues in Apple's operating systems that could allow a malicious HID (Human Interface Device) to cause unexpected process crashes. It affects multiple App...
This CVE describes a race condition vulnerability in Apple's web content processing that could allow an attacker to cause unexpected process crashes. It affects multiple Apple operating systems and Sa...