Apple Security Vulnerabilities (CVEs)
Track 1,313 security vulnerabilities affecting Apple products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.
A race condition vulnerability in macOS allows malicious applications to potentially gain root privileges. This affects macOS Big Sur, Monterey, and V...
Jan 10, 2024This macOS kernel vulnerability allows malicious applications to bypass memory bounds checks, potentially causing system crashes or writing to kernel ...
Jan 10, 2024This CVE describes a memory corruption vulnerability in Apple operating systems that allows malicious applications to cause system crashes or write to...
Jan 10, 2024This vulnerability allows unauthorized access to photos in the Hidden Photos Album on Apple devices without proper authentication. It affects users of...
Jan 10, 2024This is a critical use-after-free vulnerability in Apple's WebKit browser engine that allows arbitrary code execution when processing malicious web co...
Jan 10, 2024This is a memory corruption vulnerability (CWE-787) in macOS that allows a malicious application to execute arbitrary code with kernel privileges. It ...
Jan 10, 2024This is a macOS kernel memory corruption vulnerability that allows malicious applications to execute arbitrary code with kernel privileges. It affects...
Jan 10, 2024This vulnerability allows attackers to execute arbitrary code by tricking users into processing malicious font files. It affects Apple macOS, iOS, and...
Jan 10, 2024This vulnerability allows malicious applications to inject code into sensitive Xcode binaries on macOS systems. It affects macOS Monterey, Big Sur, an...
Jan 10, 2024This vulnerability allows an attacker with arbitrary read/write capability to bypass Pointer Authentication security mechanisms on Apple devices. It a...
Jan 9, 2024This CVE describes memory corruption vulnerabilities in macOS that could allow arbitrary code execution when processing malicious files. Attackers cou...
Dec 12, 2023This CVE describes memory corruption vulnerabilities in macOS that could allow arbitrary code execution when processing malicious files. Attackers cou...
Dec 12, 2023This CVE describes memory corruption vulnerabilities in macOS that could allow attackers to execute arbitrary code or cause application crashes by tri...
Dec 12, 2023This CVE describes memory corruption vulnerabilities in macOS that could allow arbitrary code execution when processing malicious files. Attackers cou...
Dec 12, 2023This CVE describes memory corruption vulnerabilities in macOS's AppleGVA framework that could allow arbitrary code execution when processing malicious...
Dec 12, 2023This vulnerability in macOS AppleVADriver allows out-of-bounds write when processing images, potentially leading to arbitrary code execution. Attacker...
Dec 12, 2023This CVE-2023-42886 is an out-of-bounds read vulnerability in macOS that could allow a user to cause unexpected app termination or arbitrary code exec...
Dec 12, 2023This memory handling vulnerability in Apple's image processing components allows arbitrary code execution when processing a malicious image. It affect...
Dec 12, 2023This CVE describes memory corruption vulnerabilities in macOS that could allow arbitrary code execution when processing malicious files. Attackers cou...
Dec 12, 2023This CVE describes memory corruption vulnerabilities in macOS that could allow arbitrary code execution when processing malicious files. Attackers cou...
Dec 12, 2023This memory handling vulnerability in Apple operating systems allows arbitrary code execution in user-installed apps when processing malicious input. ...
Dec 12, 2023This is a memory corruption vulnerability in Apple's WebKit browser engine that allows arbitrary code execution when processing malicious web content....
Nov 30, 2023This is a memory corruption vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel privileges. It a...
Oct 25, 2023This macOS vulnerability allows websites to access sensitive user data through improper symlink resolution. It affects macOS Monterey, Ventura, and So...
Oct 25, 2023This CVE-2023-42847 vulnerability allows attackers to bypass authentication mechanisms and access passkeys without proper credentials. It affects macO...
Oct 25, 2023This is a logic vulnerability in Apple's WebKit browser engine that allows arbitrary code execution when processing malicious web content. Attackers c...
Oct 25, 2023This is a memory corruption vulnerability in macOS that could allow arbitrary code execution or application crashes when processing malicious files. I...
Oct 25, 2023This vulnerability in iOS/iPadOS VoiceOver accessibility feature could expose user passwords by reading them aloud. It affects users with VoiceOver en...
Oct 25, 2023This CVE describes a use-after-free vulnerability in macOS that allows an application to execute arbitrary code with kernel privileges. Attackers coul...
Oct 25, 2023This is a memory corruption vulnerability in Apple operating systems that allows an app to execute arbitrary code with kernel privileges. It affects i...
Oct 25, 2023This vulnerability in iOS/iPadOS prevents devices from properly locking, allowing unauthorized physical access to unlocked devices. It affects users o...
Oct 25, 2023This CVE describes a use-after-free vulnerability in Apple's web content processing components that could allow arbitrary code execution when visiting...
Oct 25, 2023CVE-2023-44487 is an HTTP/2 protocol vulnerability that allows attackers to cause denial of service by rapidly resetting streams, consuming server res...
Oct 10, 2023This CVE describes a use-after-free vulnerability in Apple's iOS, iPadOS, and macOS that allows a malicious app to execute arbitrary code with kernel ...
Sep 27, 2023CVE-2023-41984 is a memory handling vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel privileg...
Sep 27, 2023This CVE describes a privilege escalation vulnerability in Apple operating systems where improper access restrictions allow a user to gain elevated pr...
Sep 27, 2023This CVE-2023-41071 is a use-after-free vulnerability in Apple operating systems that allows an app to execute arbitrary code with kernel privileges. ...
Sep 27, 2023This vulnerability allows arbitrary code execution when processing malicious web content in Apple's WebKit browser engine. It affects users of Safari ...
Sep 27, 2023This is a kernel privilege escalation vulnerability in Apple operating systems that allows malicious apps to execute arbitrary code with kernel-level ...
Sep 27, 2023This is a memory handling vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel privileges. It aff...
Sep 27, 2023This CVE describes a permissions bypass vulnerability in Apple operating systems where an application can delete files it shouldn't have access to. Th...
Sep 27, 2023This critical macOS vulnerability allows sandboxed processes to bypass security restrictions, potentially escaping their isolated execution environmen...
Sep 27, 2023This vulnerability in Safari's iframe sandbox enforcement allows attackers with JavaScript execution to bypass security restrictions and execute arbit...
Sep 27, 2023This iOS/iPadOS privilege escalation vulnerability allows malicious apps to gain root privileges on affected devices. The issue affects iOS and iPadOS...
Sep 27, 2023This is a macOS kernel vulnerability where improper bounds checking allows attackers to read kernel memory or cause system crashes. It affects macOS s...
Sep 27, 2023This vulnerability allows a malicious app to execute arbitrary code with kernel privileges on iOS and iPadOS devices. It affects users running iOS/iPa...
Sep 27, 2023This CVE describes a memory handling vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel privile...
Sep 27, 2023This vulnerability allows malicious apps to gain elevated privileges on Apple devices. It affects iOS, iPadOS, tvOS, and watchOS devices running versi...
Sep 27, 2023This CVE describes a bounds check vulnerability in macOS that allows remote attackers to cause denial-of-service conditions. The issue affects macOS s...
Sep 27, 2023This vulnerability allows a remote attacker to cause unexpected app termination or execute arbitrary code on affected Apple devices. It affects multip...
Sep 27, 2023Why Monitor Apple Security Vulnerabilities?
Real-time CVE tracking: Our automated system monitors 1,313+ known vulnerabilities affecting Apple products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.
Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Apple packages in under 60 seconds. No agents required - completely agentless scanning that works across Apple deployments.
Free vulnerability database: Access detailed information about every Apple CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.
🚀 Get Started in 60 Seconds
- Register free account & add your servers
- Run one-time scan or schedule automatic monitoring (every 1-24 hours)
- Receive instant alerts when new Apple CVEs affect your systems
- Access dashboard with severity breakdown & fix instructions