Apple Security Vulnerabilities (CVEs)

Track 1,307 security vulnerabilities affecting Apple products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.

161 Critical
705 High
412 Medium
29 Low
🔔 Get Alerts for Apple
CVE-2024-27888 5.5

This CVE describes a macOS permissions vulnerability that allows applications to modify protected areas of the file system. The issue affects macOS sy...

Jul 29, 2024
CVE-2024-40774 7.1

This vulnerability allows malicious applications to bypass macOS and iOS privacy preferences by exploiting a downgrade issue in code-signing restricti...

Jul 29, 2024
CVE-2024-40776 4.3

A use-after-free vulnerability in Apple's WebKit browser engine allows processing malicious web content to cause unexpected process crashes. This affe...

Jul 29, 2024
CVE-2024-40779 5.5

This CVE describes an out-of-bounds read vulnerability in Apple's web content processing that could cause unexpected process crashes. It affects multi...

Jul 29, 2024
CVE-2024-40781 7.8

This CVE describes a local privilege escalation vulnerability in macOS that allows an attacker with existing local access to gain elevated privileges....

Jul 29, 2024
CVE-2024-40783 5.5

This macOS vulnerability allows malicious applications to bypass Privacy preferences and access restricted data containers. It affects macOS Monterey,...

Jul 29, 2024
CVE-2024-40785 6.1

This is a cross-site scripting (XSS) vulnerability in Apple's web content processing that allows attackers to inject malicious scripts into web pages ...

Jul 29, 2024
CVE-2024-27809 5.5

This CVE describes a privacy vulnerability in macOS where applications could access sensitive user data from system logs. The issue affects macOS syst...

Jul 29, 2024
CVE-2024-27826 7.8

This is a privilege escalation vulnerability in Apple operating systems where an application can execute arbitrary code with kernel privileges due to ...

Jul 29, 2024
CVE-2024-27863 5.5

This CVE describes an information disclosure vulnerability in Apple operating systems where log entries could reveal kernel memory layout details. A l...

Jul 29, 2024
CVE-2024-27872 5.5

This vulnerability allows a malicious app to bypass macOS symlink validation and access protected user data. It affects macOS systems before Sonoma 14...

Jul 29, 2024
CVE-2024-27877 6.1

A memory handling vulnerability in macOS allows processing malicious files to cause denial-of-service or memory disclosure. Affects macOS Monterey, Ve...

Jul 29, 2024
CVE-2024-27881 5.3

This vulnerability allows applications to access sensitive contact information from macOS system logs due to insufficient data redaction. It affects m...

Jul 29, 2024
CVE-2024-27883 4.4

This CVE describes a macOS permissions vulnerability where applications can bypass file system protections and modify restricted areas. It affects mac...

Jul 29, 2024
CVE-2023-40396 7.8

This vulnerability allows an app to execute arbitrary code with kernel privileges, potentially gaining full control over affected Apple devices. It af...

Jul 29, 2024
CVE-2023-42918 6.3

This CVE describes a sandbox escape vulnerability in macOS where a sandboxed process can bypass security restrictions. It affects macOS systems before...

Jul 29, 2024
CVE-2023-42943 5.5

This macOS vulnerability allows applications to access sensitive location information that should be redacted in system logs. It affects macOS users r...

Jul 29, 2024
CVE-2023-42958 7.8

A permissions issue in macOS allowed applications to gain elevated privileges beyond their intended access. This affects macOS Ventura systems before ...

Jul 29, 2024
CVE-2024-27833 8.8

This CVE describes an integer overflow vulnerability in Apple's WebKit browser engine that could allow arbitrary code execution when processing malici...

Jun 10, 2024
CVE-2024-27838 6.5

This vulnerability allows malicious webpages to fingerprint users through Apple's WebKit browser engine. It affects users of Safari and Apple devices ...

Jun 10, 2024
CVE-2024-27844 5.5

This vulnerability allows a website's permission dialog to persist after users navigate away from the site, potentially tricking users into granting u...

Jun 10, 2024
CVE-2024-27848 7.8

A permissions checking vulnerability in Apple operating systems allows malicious applications to gain root privileges. This affects macOS, iOS, and iP...

Jun 10, 2024
CVE-2024-27851 8.8

This is a memory corruption vulnerability in Apple's WebKit browser engine, allowing arbitrary code execution when processing malicious web content. I...

Jun 10, 2024
CVE-2024-27857 7.8

This CVE describes an out-of-bounds memory access vulnerability in multiple Apple operating systems that could allow a remote attacker to crash applic...

Jun 10, 2024
CVE-2024-27807 4.3

This vulnerability allows iOS/iPadOS apps to bypass App Privacy Report logging, potentially hiding their data access activities from users. It affects...

Jun 10, 2024
CVE-2024-27808 8.8

This memory handling vulnerability in Apple's WebKit browser engine allows processing malicious web content to execute arbitrary code on affected devi...

Jun 10, 2024
CVE-2024-27812 6.5

A denial-of-service vulnerability in visionOS file handling protocol allows attackers to crash devices by processing malicious web content. This affec...

Jun 10, 2024
CVE-2024-27815 7.8

This CVE describes an out-of-bounds write vulnerability in Apple operating systems that allows an app to execute arbitrary code with kernel privileges...

Jun 10, 2024
CVE-2024-27820 8.8

This memory handling vulnerability in Apple's WebKit browser engine allows processing malicious web content to execute arbitrary code on affected devi...

Jun 10, 2024
CVE-2024-27830 6.5

This vulnerability allows malicious webpages to fingerprint users by exploiting improper state management in Apple's WebKit browser engine. It affects...

Jun 10, 2024
CVE-2024-27831 7.8

This CVE describes an out-of-bounds write vulnerability in Apple operating systems that could allow an attacker to execute arbitrary code or cause app...

Jun 10, 2024
CVE-2024-23251 4.6

An authentication vulnerability in Apple's Mail application allows attackers with physical access to a device to potentially extract Mail account cred...

Jun 10, 2024
CVE-2024-27800 6.5

This vulnerability in Apple operating systems allows processing a maliciously crafted message to cause a denial-of-service condition. It affects multi...

Jun 10, 2024
CVE-2024-27801 7.8

This Apple privilege escalation vulnerability allows malicious apps to gain elevated system privileges on affected Apple devices. It impacts users run...

Jun 10, 2024
CVE-2024-27805 5.5

This CVE describes an environment variable validation vulnerability in Apple operating systems that could allow malicious applications to access sensi...

Jun 10, 2024
CVE-2024-23299 8.6

This vulnerability allows a malicious macOS application to escape its sandbox restrictions, potentially accessing system resources or other applicatio...

Jun 10, 2024
CVE-2022-32897 7.8

This vulnerability allows attackers to execute arbitrary code on macOS systems by tricking users into opening malicious TIFF image files. It affects m...

Jun 10, 2024
CVE-2022-48578 7.1

An out-of-bounds read vulnerability in AppleScript processing on macOS Monterey allows attackers to cause unexpected termination or memory disclosure....

Jun 10, 2024
CVE-2023-40389 5.5

This macOS vulnerability allows applications to bypass data container restrictions and access sensitive user data they shouldn't have permission to ac...

Jun 10, 2024
CVE-2024-27842 7.8

This is a macOS kernel privilege escalation vulnerability that allows a malicious application to execute arbitrary code with kernel-level privileges. ...

May 14, 2024
CVE-2024-27847 5.5

This vulnerability allows an app to bypass privacy preferences on Apple devices, potentially accessing sensitive user data without proper consent. It ...

May 14, 2024
CVE-2024-27841 5.5

This vulnerability allows an app to disclose kernel memory due to improper memory handling in Apple operating systems. It affects iOS, iPadOS, and mac...

May 14, 2024
CVE-2024-27825 7.1

This vulnerability allows malicious applications to bypass macOS Privacy preferences on Intel-based Mac computers by exploiting a downgrade issue in c...

May 14, 2024
CVE-2024-27829 7.8

This is a memory handling vulnerability in macOS that allows processing malicious files to cause application crashes or arbitrary code execution. It a...

May 14, 2024
CVE-2024-27818 7.8

This CVE describes a memory handling vulnerability in Apple operating systems that could allow an attacker to cause app crashes or execute arbitrary c...

May 14, 2024
CVE-2024-27822 7.8

This CVE describes a privilege escalation vulnerability in macOS where a malicious application could exploit a logic issue to gain root privileges. It...

May 14, 2024
CVE-2024-27804 5.5

This memory handling vulnerability in Apple operating systems allows malicious apps to execute arbitrary code with kernel privileges, potentially gain...

May 14, 2024
CVE-2024-27813 8.6

This macOS vulnerability allows malicious applications to execute arbitrary code outside their sandbox or with elevated privileges. It affects macOS s...

May 14, 2024
CVE-2024-27796 7.8

This privilege escalation vulnerability in Apple operating systems allows attackers to gain elevated system privileges. It affects iOS, iPadOS, and ma...

May 14, 2024
CVE-2024-27789 5.5

This CVE-2024-27789 is a logic flaw in Apple operating systems that allows applications to access sensitive user data they shouldn't normally have per...

May 14, 2024

Why Monitor Apple Security Vulnerabilities?

Real-time CVE tracking: Our automated system monitors 1,307+ known vulnerabilities affecting Apple products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.

Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Apple packages in under 60 seconds. No agents required - completely agentless scanning that works across Apple deployments.

Free vulnerability database: Access detailed information about every Apple CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.

🚀 Get Started in 60 Seconds

  • Register free account & add your servers
  • Run one-time scan or schedule automatic monitoring (every 1-24 hours)
  • Receive instant alerts when new Apple CVEs affect your systems
  • Access dashboard with severity breakdown & fix instructions
Start Monitoring Apple CVEs Free