Apple Security Vulnerabilities (CVEs)
Track 1,282 security vulnerabilities affecting Apple products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.
This vulnerability in Xcode allows malicious applications to access private information they shouldn't have permission to view. It affects developers ...
Mar 31, 2025This vulnerability allows an attacker with physical access to a locked Apple device to use Siri to access sensitive user data. It affects macOS, iOS, ...
Mar 31, 2025This CVE describes a logging vulnerability in Apple operating systems where insufficient data redaction allowed apps to access sensitive user informat...
Mar 31, 2025This vulnerability in macOS allows malicious applications to bypass security restrictions and access protected user data without proper authorization....
Mar 31, 2025This CVE describes a macOS permissions vulnerability where malicious applications can enable iCloud storage features without user consent. This affect...
Mar 31, 2025This CVE describes a buffer overflow vulnerability in Apple's web content processing components. Attackers can cause unexpected process crashes by tri...
Mar 31, 2025A logic error in image parsing across multiple Apple operating systems could lead to disclosure of user information when processing malicious images. ...
Mar 31, 2025A permissions vulnerability in macOS allows applications to bypass security restrictions and access protected user data. This affects macOS Ventura, S...
Mar 31, 2025This is a critical memory corruption vulnerability in Apple's video processing components across multiple operating systems. Processing a maliciously ...
Mar 31, 2025A script imports isolation vulnerability in Apple WebKit allows malicious websites to bypass security boundaries and access sensitive data from other ...
Mar 31, 2025This CVE describes a memory disclosure vulnerability in Apple's web content processing across multiple operating systems. An attacker can craft malici...
Mar 31, 2025An integer overflow vulnerability in macOS allows local users to elevate privileges by exploiting improper input validation. This affects macOS Ventur...
Mar 31, 2025This CVE describes a macOS sandbox escape vulnerability where malicious applications can bypass sandbox restrictions to access sensitive user data. It...
Mar 31, 2025This vulnerability allows applications to bypass privacy preferences on affected Apple operating systems. It affects users running visionOS, iOS, and ...
Mar 31, 2025A permissions vulnerability in Apple operating systems allows applications to read arbitrary file metadata without proper authorization. This affects ...
Mar 31, 2025This CVE describes a buffer overflow vulnerability in macOS kernel memory handling that could allow a malicious application to cause system crashes or...
Mar 31, 2025This vulnerability in Apple's Safari browser and related operating systems allows attackers to misrepresent a download's origin, potentially tricking ...
Mar 31, 2025A sandbox escape vulnerability in Apple Mail allows malicious email content to bypass the 'Block All Remote Content' security setting. This could enab...
Mar 31, 2025This vulnerability allows a malicious app to escape its sandbox restrictions on affected Apple operating systems, potentially gaining unauthorized acc...
Mar 31, 2025This vulnerability allows a malicious application to gain root privileges on affected macOS systems. It affects macOS Sonoma versions before 14.6. The...
Mar 21, 2025This memory handling vulnerability in Apple's web content processing allows attackers to cause denial-of-service conditions. It affects users of Apple...
Mar 21, 2025This vulnerability allows files received via AirDrop to bypass macOS/iOS quarantine flagging, which normally warns users about potentially unsafe file...
Mar 21, 2025This CVE describes an out-of-bounds read vulnerability in macOS that could allow a malicious application to read kernel memory or cause system crashes...
Mar 21, 2025This vulnerability allows attackers on the same network to intercept and view sensitive information transmitted by affected Apple devices. It affects ...
Mar 17, 2025This vulnerability allows attackers to modify protected system files by restoring maliciously crafted backup files. It affects Apple devices running v...
Mar 17, 2025This CVE describes a macOS vulnerability where applications could bypass security checks and access sensitive user data. It affects macOS systems befo...
Mar 17, 2025This CVE describes an out-of-bounds write vulnerability in macOS file parsing that could allow an attacker to cause unexpected application termination...
Mar 17, 2025This critical vulnerability allows malicious web content to break out of the Web Content sandbox via an out-of-bounds write issue, potentially enablin...
Mar 11, 2025A double free vulnerability in Apple operating systems allows malicious applications to execute arbitrary code with kernel privileges. This affects ma...
Mar 10, 2025This vulnerability allows malicious web content to cause unexpected process crashes in Apple's WebKit browser engine. It affects users of Safari and A...
Mar 10, 2025This CVE describes a memory handling vulnerability in Apple operating systems that could allow a malicious app to cause system crashes or corrupt kern...
Mar 10, 2025This macOS vulnerability allows malicious applications to access removable storage devices (like USB drives) without user permission. It affects macOS...
Mar 10, 2025This CVE describes an information disclosure vulnerability in Apple operating systems where a local user could potentially access sensitive user infor...
Mar 10, 2025This vulnerability allows a malicious application to cause kernel memory corruption or system crashes on macOS systems. It affects macOS users running...
Mar 10, 2025This vulnerability allows a malicious app to modify other applications without proper App Management permission on Apple devices. It affects iOS, iPad...
Mar 10, 2025A SecureROM vulnerability in certain Apple devices allows unauthenticated local attackers with physical access to execute arbitrary code during boot v...
Feb 21, 2025This macOS privilege escalation vulnerability allows local attackers to gain elevated system privileges. It affects macOS Ventura, Sonoma, and Sequoia...
Jan 30, 2025This vulnerability is an out-of-bounds read (CWE-125) in Apple's WebKit browser engine that could cause unexpected process crashes when processing mal...
Jan 27, 2025This vulnerability allows malicious applications to bypass browser extension authentication in Safari by exploiting a logging issue that exposes sensi...
Jan 27, 2025This CVE describes a privacy preference bypass vulnerability in macOS that allows applications to circumvent user-configured privacy settings. Affecte...
Jan 27, 2025This CVE describes a local privilege escalation vulnerability in macOS where improper permission validation allows a local attacker to gain elevated p...
Jan 27, 2025A null pointer dereference vulnerability in Apple operating systems allows remote attackers to cause denial-of-service conditions. This affects macOS,...
Jan 27, 2025A macOS vulnerability in the Messages app where deleting conversations may expose user contact information in system logs. This affects users running ...
Jan 27, 2025This vulnerability allows command injection when copying URLs from Web Inspector in affected Apple products. Attackers could execute arbitrary command...
Jan 27, 2025This macOS kernel memory corruption vulnerability allows malicious applications to cause system crashes or corrupt kernel memory, potentially leading ...
Jan 27, 2025A buffer overflow vulnerability in macOS allows applications with root privileges to execute arbitrary code with kernel privileges. This could lead to...
Jan 27, 2025This CVE describes an out-of-bounds write vulnerability in Apple operating systems that could allow an attacker to cause system crashes or corrupt ker...
Jan 27, 2025This CVE describes a memory handling vulnerability in Apple's web content processing that could lead to denial-of-service. It affects multiple Apple o...
Jan 27, 2025This CVE describes a validation logic vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel privil...
Jan 27, 2025This vulnerability in Apple operating systems allows parsing a malicious file to cause unexpected app termination (denial of service). It affects user...
Jan 27, 2025Why Monitor Apple Security Vulnerabilities?
Real-time CVE tracking: Our automated system monitors 1,282+ known vulnerabilities affecting Apple products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.
Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Apple packages in under 60 seconds. No agents required - completely agentless scanning that works across Apple deployments.
Free vulnerability database: Access detailed information about every Apple CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.
🚀 Get Started in 60 Seconds
- Register free account & add your servers
- Run one-time scan or schedule automatic monitoring (every 1-24 hours)
- Receive instant alerts when new Apple CVEs affect your systems
- Access dashboard with severity breakdown & fix instructions