Apple Security Vulnerabilities (CVEs)
Track 1,328 security vulnerabilities affecting Apple products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.
This CVE describes a use-after-free vulnerability in Apple's web content processing components that could allow arbitrary code execution. Attackers co...
Sep 27, 2023This CVE describes a macOS sandbox escape vulnerability that allows a sandboxed process to bypass security restrictions. It affects macOS systems befo...
Sep 27, 2023This is a macOS kernel privilege escalation vulnerability that allows malicious applications to execute arbitrary code with kernel-level privileges. I...
Sep 27, 2023This CVE describes a buffer overflow vulnerability in macOS that allows an application to execute arbitrary code with kernel privileges. Attackers cou...
Sep 27, 2023This CVE describes a privilege escalation vulnerability in Apple operating systems that allows local attackers to gain elevated privileges. It affects...
Sep 21, 2023This vulnerability allows arbitrary code execution by processing a malicious font file on Apple devices. It affects iOS, iPadOS, tvOS, watchOS, and ma...
Sep 12, 2023This CVE describes a buffer overflow vulnerability in Apple's image processing that allows arbitrary code execution when processing malicious images. ...
Sep 7, 2023A race condition vulnerability in macOS allows malicious applications to execute arbitrary code with kernel privileges, potentially gaining full syste...
Sep 6, 2023A buffer overflow vulnerability in macOS allows malicious applications to execute arbitrary code with kernel privileges. This affects macOS systems be...
Sep 6, 2023This CVE describes a privilege escalation vulnerability in macOS where a malicious application could exploit a logic issue to gain root privileges. It...
Sep 6, 2023This CVE describes a buffer overflow vulnerability in macOS that allows an application to cause system crashes or write to kernel memory. It affects m...
Sep 6, 2023This CVE describes a buffer overflow vulnerability in macOS that allows malicious applications to cause system crashes or write to kernel memory. It a...
Sep 6, 2023This CVE describes a buffer overflow vulnerability in macOS that allows an application to cause system crashes or write to kernel memory. It affects m...
Sep 6, 2023This CVE describes a buffer overflow vulnerability in macOS that allows malicious applications to cause system crashes or write to kernel memory. It a...
Sep 6, 2023This CVE describes a buffer overflow vulnerability in macOS that allows malicious applications to cause system crashes or write to kernel memory. It a...
Sep 6, 2023CVE-2023-4750 is a use-after-free vulnerability in Vim text editor that could allow an attacker to execute arbitrary code by tricking a user into open...
Sep 4, 2023CVE-2023-4751 is a heap-based buffer overflow vulnerability in Vim text editor versions prior to 9.0.1331. Attackers can exploit this by tricking user...
Sep 3, 2023CVE-2023-4736 is an untrusted search path vulnerability in Vim that allows attackers to execute arbitrary code by placing malicious files in directori...
Sep 2, 2023An integer overflow vulnerability in Vim before version 9.0.1846 allows attackers to cause a denial of service or potentially execute arbitrary code b...
Sep 2, 2023This is a macOS kernel privilege escalation vulnerability that allows a malicious application to execute arbitrary code with kernel-level privileges. ...
Aug 14, 2023This is a memory corruption vulnerability in Apple's WebKit browser engine that allows arbitrary code execution when processing malicious web content....
Aug 14, 2023This vulnerability in macOS allows processing malicious AppleScript binaries to cause unexpected app termination or memory disclosure. It affects macO...
Aug 14, 2023This CVE describes a type confusion vulnerability in Apple's WebKit browser engine that could allow attackers to execute arbitrary code on affected de...
Aug 14, 2023This vulnerability allows attackers to execute arbitrary code by tricking users into processing a malicious font file. It affects macOS systems before...
Aug 14, 2023This macOS vulnerability allows malicious applications to bypass file system protection mechanisms and modify restricted areas. It affects macOS Big S...
Jul 28, 2023This is a critical kernel privilege escalation vulnerability in Apple operating systems. An out-of-bounds write allows malicious apps to execute arbit...
Jul 28, 2023This macOS vulnerability allows sandboxed processes to bypass security restrictions through a logic flaw. It affects macOS Big Sur, Monterey, and Vent...
Jul 28, 2023This is a critical kernel privilege escalation vulnerability in multiple Apple operating systems. An attacker can exploit memory handling flaws to exe...
Jul 28, 2023This CVE describes a critical kernel-level out-of-bounds read vulnerability in Apple operating systems. An attacker could exploit this to execute arbi...
Jul 28, 2023This CVE-2023-38590 is a buffer overflow vulnerability in Apple operating systems that allows remote attackers to cause system crashes or corrupt kern...
Jul 28, 2023This CVE-2023-38598 is a use-after-free vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel priv...
Jul 28, 2023This is a memory corruption vulnerability in Apple's WebKit browser engine that allows arbitrary code execution when processing malicious web content....
Jul 27, 2023This vulnerability allows a remote attacker to cause denial-of-service on affected Apple devices. The issue affects iOS, iPadOS, and macOS systems bef...
Jul 27, 2023This vulnerability allows arbitrary code execution when processing malicious web content. It affects Apple devices running vulnerable versions of iOS,...
Jul 27, 2023This vulnerability allows a malicious app to execute arbitrary code with kernel privileges on affected Apple devices. It affects iOS, iPadOS, and macO...
Jul 27, 2023This macOS vulnerability allows malicious applications to bypass file system protection mechanisms and modify restricted system areas. It affects macO...
Jul 27, 2023This vulnerability allows malicious websites to bypass the Same Origin Policy in Apple's WebKit browser engine, potentially enabling cross-site data t...
Jul 27, 2023This vulnerability allows a malicious app to execute arbitrary code with kernel privileges on affected Apple devices. It affects iOS, iPadOS, and macO...
Jul 27, 2023This is a use-after-free vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel privileges. It affe...
Jul 27, 2023This is a memory corruption vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel privileges. It a...
Jul 27, 2023This vulnerability allows attackers to read memory outside the intended buffer when processing malicious files on macOS systems. It affects macOS Mont...
Jul 27, 2023This vulnerability allows processing a malicious file to cause unexpected app termination or arbitrary code execution on affected macOS systems. It af...
Jul 27, 2023This CVE describes a sandbox escape vulnerability in macOS where a sandboxed process can bypass security restrictions. It affects macOS systems runnin...
Jul 27, 2023This is a memory corruption vulnerability in Apple's WebKit browser engine that allows arbitrary code execution when processing malicious web content....
Jul 27, 2023This vulnerability allows malicious iOS/iPadOS apps to escape their security sandbox, potentially accessing system resources or other app data they sh...
Jul 27, 2023This vulnerability in macOS allows processing malicious files to cause unexpected app termination or arbitrary code execution. It affects macOS Big Su...
Jul 27, 2023This is a critical WebKit vulnerability in Apple products that allows arbitrary code execution when processing malicious web content. Attackers can ex...
Jul 27, 2023This is a privilege escalation vulnerability in Apple operating systems that allows a local user to gain elevated privileges. It affects iOS, iPadOS, ...
Jul 27, 2023This CVE describes a use-after-free vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel privileg...
Jul 27, 2023This CVE describes a privilege escalation vulnerability in macOS where a malicious application could exploit a logic flaw to gain root privileges. It ...
Jun 23, 2023Why Monitor Apple Security Vulnerabilities?
Real-time CVE tracking: Our automated system monitors 1,328+ known vulnerabilities affecting Apple products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.
Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Apple packages in under 60 seconds. No agents required - completely agentless scanning that works across Apple deployments.
Free vulnerability database: Access detailed information about every Apple CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.
🚀 Get Started in 60 Seconds
- Register free account & add your servers
- Run one-time scan or schedule automatic monitoring (every 1-24 hours)
- Receive instant alerts when new Apple CVEs affect your systems
- Access dashboard with severity breakdown & fix instructions