Apple Security Vulnerabilities (CVEs)
Track 1,277 security vulnerabilities affecting Apple products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.
This CVE describes a memory corruption vulnerability in Apple operating systems that allows an app to cause system crashes or corrupt kernel memory. I...
Feb 11, 2026A path validation vulnerability in Apple operating systems allows malicious applications to gain root privileges through improper path handling. This ...
Feb 11, 2026A race condition vulnerability in Apple operating systems allows malicious applications to potentially gain root privileges. This affects users runnin...
Feb 11, 2026This memory handling vulnerability in Apple operating systems allows malicious applications to crash system processes. It affects macOS, iOS, and iPad...
Feb 11, 2026This vulnerability allows applications to bypass certain privacy preferences on Apple operating systems, potentially accessing sensitive user data wit...
Feb 11, 2026A macOS vulnerability allows malicious applications to gain root privileges through improper symlink handling. This affects macOS systems before versi...
Feb 11, 2026This macOS vulnerability allows applications to bypass privacy controls and access sensitive user data without proper authorization. It affects macOS ...
Feb 11, 2026This CVE describes a memory management vulnerability in Apple's WebKit browser engine that could cause unexpected process crashes when processing mali...
Feb 11, 2026This memory handling vulnerability in Apple operating systems allows processing malicious files to cause denial-of-service or memory disclosure. It af...
Feb 11, 2026This CVE describes an out-of-bounds memory access vulnerability in Apple's media file processing across multiple operating systems. Attackers can craf...
Feb 11, 2026A macOS vulnerability allows apps with root privileges to access private information due to insufficient redaction of sensitive data. This affects mac...
Feb 11, 2026A cache handling vulnerability in macOS allows applications to cause denial-of-service conditions. This affects macOS Sequoia, Tahoe, and Sonoma opera...
Feb 11, 2026This CVE describes a path handling vulnerability in macOS that allows an application to gain root privileges through improper validation. It affects m...
Feb 11, 2026A macOS privilege escalation vulnerability allows attackers with root access to delete protected system files, potentially causing system instability ...
Feb 11, 2026A buffer overflow vulnerability in macOS and iOS/iPadOS allows malicious USB HID devices to cause unexpected process crashes. This affects users of ma...
Feb 11, 2026This CVE describes a permissions vulnerability in macOS that allows applications to monitor keystrokes without proper user authorization. It affects m...
Feb 11, 2026A path handling vulnerability in macOS allows applications to bypass intended restrictions and access sensitive user data. This affects macOS systems ...
Feb 11, 2026A logic vulnerability in macOS allows remote attackers to cause denial-of-service conditions. This affects macOS Sequoia before 15.7.4 and macOS Sonom...
Feb 11, 2026This vulnerability allows a malicious HID (Human Interface Device) to cause unexpected process crashes on affected Apple systems. It affects macOS, iO...
Feb 11, 2026This vulnerability allows a malicious Human Interface Device (HID) like a keyboard or mouse to cause unexpected process crashes on affected Apple syst...
Feb 11, 2026A buffer overflow vulnerability in macOS and iOS/iPadOS allows malicious HID devices to cause unexpected process crashes. This affects users of macOS ...
Feb 11, 2026A buffer overflow vulnerability in macOS and iOS/iPadOS allows a malicious HID (Human Interface Device) to cause unexpected process crashes. This affe...
Feb 11, 2026This vulnerability allows a malicious HID (Human Interface Device) like a keyboard or mouse to cause unexpected process crashes on affected Apple devi...
Feb 11, 2026A path handling vulnerability in iOS/iPadOS backup restoration allows malicious backup files to modify protected system files. This affects users who ...
Feb 11, 2026This CVE describes an authorization vulnerability in macOS that allows applications to bypass intended access controls and potentially access sensitiv...
Feb 11, 2026This vulnerability allows attackers to read sensitive memory contents by tricking users into opening malicious Keynote files. It affects macOS, iOS, i...
Jan 28, 2026An out-of-bounds read vulnerability in Apple Pages document processing could allow an attacker to cause unexpected termination or disclose process mem...
Jan 28, 2026This vulnerability allows arbitrary file write through path traversal in archive extraction functions. Attackers can place malicious archives that ext...
Jan 23, 2026This CVE describes a permissions vulnerability in Xcode that allows applications to bypass macOS Privacy preferences. This affects developers using Xc...
Jan 16, 2026A macOS logging vulnerability allows applications to access sensitive user data that should have been redacted. This affects macOS Tahoe versions befo...
Jan 16, 2026This vulnerability allows malicious apps to corrupt coprocessor memory on Apple iOS and iPadOS devices. It affects users running iOS/iPadOS versions b...
Jan 16, 2026This vulnerability allows a user to view restricted content from the lock screen on Apple iOS and iPadOS devices due to improper state management. It ...
Jan 16, 2026This CVE describes a permissions vulnerability in iOS/iPadOS that allows malicious apps to enumerate which other apps are installed on a user's device...
Jan 16, 2026This CVE describes an information disclosure vulnerability in iOS/iPadOS where malicious apps could enumerate which other apps are installed on a devi...
Jan 16, 2026A macOS permissions vulnerability allows applications to access sensitive user data they shouldn't have permission to view. This affects macOS systems...
Jan 16, 2026A permissions vulnerability in Apple operating systems allows applications to access sensitive payment tokens without proper authorization. This affec...
Dec 17, 2025This CVE describes a Gatekeeper bypass vulnerability in macOS that allows malicious applications to circumvent security checks. Attackers could potent...
Dec 17, 2025This CVE describes an iOS/iPadOS vulnerability where apps could bypass entitlement checks to access sensitive user data. It affects users running vuln...
Dec 17, 2025A macOS, iOS, iPadOS, and watchOS vulnerability allows applications to access a user's Safari browsing history due to insufficient data redaction in l...
Dec 17, 2025A macOS vulnerability allows applications to bypass cache protections and access sensitive user data they shouldn't have permission to view. This affe...
Dec 17, 2025This CVE describes an information disclosure vulnerability in Apple operating systems where an app could identify what other apps a user has installed...
Dec 17, 2025This CVE describes a sandbox escape vulnerability in macOS that allows malicious applications to bypass security restrictions. An attacker could execu...
Dec 17, 2025This CVE describes a macOS and Safari vulnerability where insufficient permission checks could allow an application to access sensitive user data. The...
Dec 17, 2025A logic vulnerability in macOS allows applications to access sensitive user data due to insufficient validation. This affects macOS systems before ver...
Dec 17, 2025This vulnerability involves memory corruption issues in Apple's operating systems that could allow a malicious HID (Human Interface Device) to cause u...
Dec 17, 2025This CVE describes a memory handling vulnerability in Apple's Safari browser and related operating systems. Processing malicious web content could cau...
Dec 17, 2025A use-after-free vulnerability in Apple's web content processing allows attackers to cause unexpected process crashes by tricking users into visiting ...
Dec 17, 2025A type confusion vulnerability in Apple's Safari browser and related operating systems could cause unexpected crashes when processing malicious web co...
Dec 17, 2025A URL validation vulnerability in macOS and Safari allows web content opened via file URLs to bypass Lockdown Mode restrictions and access Web APIs th...
Dec 17, 2025A use-after-free vulnerability in Apple's WebKit browser engine allows processing malicious web content to execute arbitrary code. This affects multip...
Dec 17, 2025Why Monitor Apple Security Vulnerabilities?
Real-time CVE tracking: Our automated system monitors 1,277+ known vulnerabilities affecting Apple products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.
Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Apple packages in under 60 seconds. No agents required - completely agentless scanning that works across Apple deployments.
Free vulnerability database: Access detailed information about every Apple CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.
🚀 Get Started in 60 Seconds
- Register free account & add your servers
- Run one-time scan or schedule automatic monitoring (every 1-24 hours)
- Receive instant alerts when new Apple CVEs affect your systems
- Access dashboard with severity breakdown & fix instructions