Apple Security Vulnerabilities (CVEs)

Track 1,308 security vulnerabilities affecting Apple products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.

161 Critical
706 High
412 Medium
29 Low
🔔 Get Alerts for Apple
CVE-2024-23229 5.5

A macOS vulnerability allows malicious applications to access Find My data, which could expose location information and device details. This affects m...

May 14, 2024
CVE-2024-4558 9.6

This is a use-after-free vulnerability in ANGLE (Almost Native Graphics Layer Engine) component of Google Chrome. It allows remote attackers to potent...

May 7, 2024
CVE-2022-48611 7.8

CVE-2022-48611 is a local privilege escalation vulnerability in iTunes for Windows. A local attacker can exploit a logic issue to gain elevated privil...

Apr 26, 2024
CVE-2024-27791 7.1

This vulnerability allows a malicious app to corrupt coprocessor memory on Apple devices, potentially leading to arbitrary code execution or system in...

Apr 24, 2024
CVE-2023-38709 7.3

CVE-2023-38709 is an input validation vulnerability in Apache HTTP Server that allows malicious backend applications or content generators to split HT...

Apr 4, 2024
CVE-2023-42913 8.8

This macOS vulnerability allows Remote Login sessions to bypass security controls and obtain full disk access permissions. It affects macOS systems wi...

Mar 28, 2024
CVE-2023-42931 7.8

This vulnerability allows a process to gain administrative privileges without proper authentication on affected macOS versions. It affects macOS Ventu...

Mar 28, 2024
CVE-2023-42947 8.6

This CVE describes a path handling vulnerability in Apple operating systems that allows malicious applications to escape their sandbox restrictions. I...

Mar 28, 2024
CVE-2023-42962 7.5

This vulnerability allows a remote attacker to cause denial-of-service conditions on affected Apple devices. The issue affects iOS and iPadOS devices ...

Mar 28, 2024
CVE-2023-42892 7.8

CVE-2023-42892 is a use-after-free vulnerability in macOS that allows a local attacker to elevate their privileges. This affects macOS Monterey, Ventu...

Mar 28, 2024
CVE-2024-2398 8.6

CVE-2024-2398 is a memory leak vulnerability in libcurl that occurs when HTTP/2 server push headers exceed the 1000-header limit. This allows attacker...

Mar 27, 2024
CVE-2024-23300 7.8

CVE-2024-23300 is a use-after-free vulnerability in GarageBand that allows arbitrary code execution when processing malicious files. Attackers can cra...

Mar 12, 2024
CVE-2024-23288 7.8

This vulnerability allows an application to elevate its privileges on affected Apple devices, potentially gaining unauthorized access to system resour...

Mar 8, 2024
CVE-2024-23294 7.8

This vulnerability in macOS allows attackers to execute arbitrary code by processing malicious input. It affects macOS systems before Sonoma 14.4. Use...

Mar 8, 2024
CVE-2024-23265 7.8

This is a memory corruption vulnerability in Apple operating systems that allows malicious apps to cause system crashes or write to kernel memory. It ...

Mar 8, 2024
CVE-2024-23268 7.8

This CVE describes a privilege escalation vulnerability in macOS where an application can exploit an injection flaw to gain elevated privileges. It af...

Mar 8, 2024
CVE-2024-23270 7.8

This is a memory corruption vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel privileges. It a...

Mar 8, 2024
CVE-2024-23274 7.8

This CVE describes a privilege escalation vulnerability in macOS where an application could exploit an injection flaw to gain elevated privileges. The...

Mar 8, 2024
CVE-2024-23276 7.8

This CVE describes a privilege escalation vulnerability in macOS where a malicious application could exploit a logic issue to gain elevated system pri...

Mar 8, 2024
CVE-2024-23278 8.6

This vulnerability allows a malicious app to escape its sandbox restrictions on Apple operating systems, potentially accessing system resources or oth...

Mar 8, 2024
CVE-2024-23286 7.8

A buffer overflow vulnerability in Apple's image processing components allows arbitrary code execution when processing malicious images. This affects ...

Mar 8, 2024
CVE-2024-23244 7.8

This macOS privilege escalation vulnerability allows a standard user application to gain elevated privileges after an administrator user logs in. It a...

Mar 8, 2024
CVE-2024-23246 8.6

This CVE describes a sandbox escape vulnerability in Apple operating systems that allows malicious applications to break out of their security sandbox...

Mar 8, 2024
CVE-2024-23248 7.1

This vulnerability in macOS allows processing a malicious file to cause a denial-of-service or potentially leak memory contents. It affects macOS syst...

Mar 8, 2024
CVE-2024-23258 7.8

This vulnerability allows attackers to execute arbitrary code by exploiting an out-of-bounds read when processing malicious images. It affects Apple v...

Mar 8, 2024
CVE-2024-0258 8.6

This memory handling vulnerability in Apple operating systems allows malicious apps to execute arbitrary code outside their sandbox or with elevated p...

Mar 8, 2024
CVE-2024-23216 7.1

This CVE describes a path traversal vulnerability in macOS that allows malicious applications to overwrite arbitrary files on the system. It affects m...

Mar 8, 2024
CVE-2024-23226 8.8

This is a memory corruption vulnerability (CWE-787) in Apple's web content processing components that could allow arbitrary code execution when proces...

Mar 8, 2024
CVE-2024-23233 7.8

This vulnerability in macOS allows malicious applications to abuse entitlements and privacy permissions granted to legitimate apps. Attackers could po...

Mar 8, 2024
CVE-2024-23225 7.8

This CVE describes a memory corruption vulnerability in Apple iOS/iPadOS kernel that allows attackers with kernel read/write capabilities to bypass me...

Mar 5, 2024
CVE-2024-23296 7.8

CVE-2024-23296 is a memory corruption vulnerability in Apple's iOS/iPadOS kernel that allows attackers with kernel read/write capabilities to bypass m...

Mar 5, 2024
CVE-2023-42928 7.8

This CVE describes a privilege escalation vulnerability in iOS and iPadOS where an app could bypass security boundaries and gain elevated privileges. ...

Feb 21, 2024
CVE-2023-42942 7.8

This CVE describes a privilege escalation vulnerability in Apple operating systems where improper symlink handling allows malicious applications to ga...

Feb 21, 2024
CVE-2023-42848 7.8

This vulnerability allows an attacker to cause heap corruption by tricking a user into processing a maliciously crafted image. It affects Apple device...

Feb 21, 2024
CVE-2023-42873 7.8

This is a kernel privilege escalation vulnerability in Apple operating systems where an application can bypass bounds checks to execute arbitrary code...

Feb 21, 2024
CVE-2023-42835 7.5

This macOS vulnerability allows attackers to bypass security checks and access user data through a logic issue. It affects macOS systems before Sonoma...

Feb 21, 2024
CVE-2023-42838 8.6

This macOS sandbox escape vulnerability allows malicious applications to break out of their security confinement and execute arbitrary code with eleva...

Feb 21, 2024
CVE-2024-23212 7.8

This is a memory handling vulnerability in Apple operating systems that allows an app to execute arbitrary code with kernel privileges. It affects mul...

Jan 23, 2024
CVE-2024-23214 8.8

This CVE describes memory corruption vulnerabilities in Apple's WebKit browser engine that could allow arbitrary code execution when processing malici...

Jan 23, 2024
CVE-2024-23222 8.8

A type confusion vulnerability in Apple's WebKit browser engine allows processing malicious web content to execute arbitrary code. This affects users ...

Jan 23, 2024
CVE-2024-23203 7.5

This vulnerability allows malicious shortcuts in macOS, iOS, and iPadOS to access sensitive user data without proper permission prompts. It affects us...

Jan 23, 2024
CVE-2024-23208 7.8

This is a memory corruption vulnerability (CWE-94: Improper Control of Generation of Code) in Apple operating systems that allows an application to ex...

Jan 23, 2024
CVE-2023-42881 7.8

This is a memory corruption vulnerability in macOS that could allow an attacker to execute arbitrary code or cause application crashes by processing a...

Jan 23, 2024
CVE-2023-42866 8.8

This memory handling vulnerability in Apple's WebKit browser engine allows processing malicious web content to execute arbitrary code on affected devi...

Jan 10, 2024
CVE-2023-42870 7.8

This CVE describes a use-after-free vulnerability in Apple operating systems that allows an app to execute arbitrary code with kernel privileges. It a...

Jan 10, 2024
CVE-2023-42876 7.1

A memory corruption vulnerability in macOS allows processing malicious files to cause denial-of-service or memory disclosure. This affects macOS users...

Jan 10, 2024
CVE-2023-42933 7.8

This macOS vulnerability allows an application to gain elevated privileges, potentially enabling unauthorized access to system resources. It affects m...

Jan 10, 2024
CVE-2023-41060 8.8

This CVE describes a type confusion vulnerability in Apple's kernel that could allow a remote attacker to execute arbitrary code with kernel privilege...

Jan 10, 2024
CVE-2023-41075 7.8

A type confusion vulnerability in Apple operating systems allows malicious applications to execute arbitrary code with kernel privileges. This affects...

Jan 10, 2024
CVE-2023-42826 7.8

This vulnerability in macOS allows arbitrary code execution when processing malicious files. Attackers can exploit improper input validation to execut...

Jan 10, 2024

Why Monitor Apple Security Vulnerabilities?

Real-time CVE tracking: Our automated system monitors 1,308+ known vulnerabilities affecting Apple products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.

Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Apple packages in under 60 seconds. No agents required - completely agentless scanning that works across Apple deployments.

Free vulnerability database: Access detailed information about every Apple CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.

🚀 Get Started in 60 Seconds

  • Register free account & add your servers
  • Run one-time scan or schedule automatic monitoring (every 1-24 hours)
  • Receive instant alerts when new Apple CVEs affect your systems
  • Access dashboard with severity breakdown & fix instructions
Start Monitoring Apple CVEs Free