Apple Security Vulnerabilities (CVEs)

Track 1,406 security vulnerabilities affecting Apple products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.

180 Critical
785 High
412 Medium
29 Low
🔔 Get Alerts for Apple
CVE-2023-32409 8.6

This vulnerability allows a remote attacker to escape the Web Content sandbox in Apple's WebKit browser engine, potentially executing arbitrary code w...

Jun 23, 2023
CVE-2023-32412 9.8

This is a critical use-after-free vulnerability in Apple operating systems that allows remote attackers to cause application crashes or execute arbitr...

Jun 23, 2023
CVE-2023-32414 8.6

This macOS vulnerability allows malicious applications to escape their security sandbox, potentially accessing system resources or other applications'...

Jun 23, 2023
CVE-2023-32419 9.8

This is a critical memory corruption vulnerability in iOS and iPadOS that allows remote attackers to execute arbitrary code on affected devices. The v...

Jun 23, 2023
CVE-2023-32434 7.8

This CVE-2023-32434 is an integer overflow vulnerability in Apple operating systems that allows malicious applications to execute arbitrary code with ...

Jun 23, 2023
CVE-2023-32439 8.8

This is a type confusion vulnerability in Apple's WebKit browser engine that allows processing malicious web content to execute arbitrary code. It aff...

Jun 23, 2023
CVE-2023-32373 8.8

This CVE describes a use-after-free vulnerability in Apple's WebKit browser engine that could allow arbitrary code execution when processing malicious...

Jun 23, 2023
CVE-2023-32380 7.8

This vulnerability allows attackers to execute arbitrary code on affected macOS systems by tricking users into processing a malicious 3D model file. I...

Jun 23, 2023
CVE-2023-32384 7.8

This CVE describes a buffer overflow vulnerability in Apple's image processing components that could allow arbitrary code execution when processing a ...

Jun 23, 2023
CVE-2023-32387 9.8

This is a critical use-after-free vulnerability in macOS that allows remote attackers to cause application crashes or execute arbitrary code on affect...

Jun 23, 2023
CVE-2023-32397 7.5

This vulnerability allows malicious apps to bypass file system protection mechanisms and modify restricted areas of the file system on Apple devices. ...

Jun 23, 2023
CVE-2023-27930 7.8

This CVE describes a type confusion vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel privileg...

Jun 23, 2023
CVE-2023-32351 7.8

This CVE describes a privilege escalation vulnerability in iTunes for Windows where a malicious application could exploit a logic flaw to gain elevate...

Jun 23, 2023
CVE-2023-32353 7.8

This CVE describes a privilege escalation vulnerability in iTunes for Windows where a malicious application could exploit a logic flaw to gain elevate...

Jun 23, 2023
CVE-2023-32357 7.1

This CVE describes an authorization vulnerability in Apple operating systems where applications can retain access to system configuration files even a...

Jun 23, 2023
CVE-2023-23516 7.8

This is a memory corruption vulnerability in macOS that allows an application to execute arbitrary code with kernel privileges. It affects macOS Big S...

Jun 23, 2023
CVE-2023-3079 8.8

This vulnerability is a type confusion flaw in Chrome's V8 JavaScript engine that allows a remote attacker to trigger heap corruption by tricking the ...

Jun 5, 2023
CVE-2023-2953 7.5

This vulnerability in OpenLDAP causes a null pointer dereference in the ber_memalloc_x() function, which can lead to denial of service (DoS) by crashi...

May 30, 2023
CVE-2023-28322 3.7

This vulnerability in curl versions before 8.1.0 causes information disclosure when reusing a handle between PUT and POST requests. It affects applica...

May 26, 2023
CVE-2023-28319 7.5

CVE-2023-28319 is a use-after-free vulnerability in curl/libcurl versions before 8.1.0 that occurs during SSH server public key verification. When ver...

May 26, 2023
CVE-2023-27969 7.8

This CVE describes a use-after-free vulnerability in Apple operating systems that allows an app to execute arbitrary code with kernel privileges. It a...

May 8, 2023
CVE-2023-28181 7.8

This is a memory corruption vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel privileges. It a...

May 8, 2023
CVE-2023-28201 9.8

This vulnerability allows a remote attacker to cause unexpected app termination or execute arbitrary code on affected Apple devices. It affects macOS,...

May 8, 2023
CVE-2023-27953 9.8

This is a critical memory corruption vulnerability in macOS kernel that allows remote attackers to cause system crashes or corrupt kernel memory. It a...

May 8, 2023
CVE-2023-27957 7.8

This CVE describes a buffer overflow vulnerability in macOS that could allow arbitrary code execution when processing malicious files. It affects macO...

May 8, 2023
CVE-2023-27958 9.1

This is a high-severity memory corruption vulnerability in macOS kernel that allows remote attackers to cause system crashes or corrupt kernel memory....

May 8, 2023
CVE-2023-27960 7.8

CVE-2023-27960 is a privilege escalation vulnerability in GarageBand for macOS that allows an application to gain elevated privileges during installat...

May 8, 2023
CVE-2023-27963 7.5

This vulnerability allows malicious shortcuts in Apple's Shortcuts app to access sensitive user data without proper permission prompts. It affects use...

May 8, 2023
CVE-2023-27967 8.6

This vulnerability in Xcode allows malicious apps to execute arbitrary code outside their sandbox or with elevated privileges. It affects developers u...

May 8, 2023
CVE-2023-27934 8.8

CVE-2023-27934 is a memory initialization vulnerability in macOS that could allow a remote attacker to cause application crashes or execute arbitrary ...

May 8, 2023
CVE-2023-27936 7.8

This CVE describes an out-of-bounds write vulnerability in Apple operating systems that allows an application to write to kernel memory or cause syste...

May 8, 2023
CVE-2023-27938 7.8

This vulnerability in GarageBand for macOS allows attackers to execute arbitrary code or cause application crashes by tricking users into opening mali...

May 8, 2023
CVE-2023-27944 8.6

This CVE describes a macOS sandbox escape vulnerability that allows malicious applications to break out of their security confinement. Affected users ...

May 8, 2023
CVE-2023-27946 7.8

CVE-2023-27946 is an out-of-bounds read vulnerability in Apple operating systems that could allow arbitrary code execution when processing malicious f...

May 8, 2023
CVE-2023-23525 7.8

This vulnerability allows a malicious application to gain root privileges on affected Apple devices. It affects macOS, iOS, and iPadOS systems running...

May 8, 2023
CVE-2023-23526 9.8

This vulnerability allows malicious files downloaded from iCloud shared-by-me folders to bypass Gatekeeper security checks on Apple devices. It affect...

May 8, 2023
CVE-2023-23532 8.8

This vulnerability allows a malicious application to escape its sandbox restrictions on affected Apple operating systems. This could enable unauthoriz...

May 8, 2023
CVE-2023-23536 7.8

This is a kernel privilege escalation vulnerability in Apple operating systems where an application can bypass bounds checks to execute arbitrary code...

May 8, 2023
CVE-2023-23540 7.8

This is a memory corruption vulnerability in Apple operating systems that allows malicious applications to execute arbitrary code with kernel privileg...

May 8, 2023
CVE-2022-32885 8.8

CVE-2022-32885 is a memory corruption vulnerability in Apple's WebKit browser engine that allows arbitrary code execution when processing malicious we...

May 8, 2023
CVE-2022-46720 8.6

This CVE describes an integer overflow vulnerability in Apple operating systems that allows malicious applications to escape their security sandbox. I...

May 8, 2023
CVE-2022-42858 7.8

CVE-2022-42858 is a memory corruption vulnerability in macOS that allows malicious applications to execute arbitrary code with kernel privileges. This...

Apr 10, 2023
CVE-2022-46709 9.8

This is a critical memory corruption vulnerability in Apple's macOS and iOS kernels that allows malicious applications to execute arbitrary code with ...

Apr 10, 2023
CVE-2023-28205 8.8

This CVE describes a use-after-free vulnerability in Apple's Safari browser and iOS/iPadOS/macOS operating systems that allows arbitrary code executio...

Apr 10, 2023
CVE-2022-26760 9.8

CVE-2022-26760 is a critical memory corruption vulnerability in Apple iOS/iPadOS that allows malicious applications to gain elevated system privileges...

Feb 27, 2023
CVE-2022-32221 9.8

This vulnerability in libcurl allows an attacker to cause memory corruption or data leakage when reusing a handle from a PUT to a POST request. Applic...

Dec 5, 2022
CVE-2022-32207 9.8

CVE-2022-32207 is a privilege escalation vulnerability in curl versions before 7.84.0 where file permission widening occurs during atomic file operati...

Jul 7, 2022
CVE-2022-2125 7.8

CVE-2022-2125 is a heap-based buffer overflow vulnerability in Vim text editor versions prior to 8.2. This allows attackers to execute arbitrary code ...

Jun 19, 2022
CVE-2022-2124 7.8

CVE-2022-2124 is a buffer over-read vulnerability in Vim text editor that allows reading beyond allocated memory boundaries. This affects users runnin...

Jun 19, 2022
CVE-2022-1642 7.5

A type mismatch vulnerability in Swift's JSONDecoder can cause deterministic crashes when processing malicious JSON documents with floating-point valu...

Jun 16, 2022

Why Monitor Apple Security Vulnerabilities?

Real-time CVE tracking: Our automated system monitors 1,406+ known vulnerabilities affecting Apple products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.

Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Apple packages in under 60 seconds. No agents required - completely agentless scanning that works across Apple deployments.

Free vulnerability database: Access detailed information about every Apple CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.

🚀 Get Started in 60 Seconds

  • Register free account & add your servers
  • Run one-time scan or schedule automatic monitoring (every 1-24 hours)
  • Receive instant alerts when new Apple CVEs affect your systems
  • Access dashboard with severity breakdown & fix instructions
Start Monitoring Apple CVEs Free