Apple Security Vulnerabilities (CVEs)
Track 1,406 security vulnerabilities affecting Apple products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.
CVE-2022-2042 is a use-after-free vulnerability in Vim text editor versions prior to 8.2. This memory corruption flaw could allow attackers to execute...
Jun 10, 2022CVE-2022-2000 is an out-of-bounds write vulnerability in Vim text editor versions prior to 8.2. This allows attackers to execute arbitrary code by tri...
Jun 9, 2022CVE-2022-1968 is a use-after-free vulnerability in Vim text editor versions prior to 8.2. This allows attackers to execute arbitrary code by tricking ...
Jun 2, 2022CVE-2022-1897 is an out-of-bounds write vulnerability in Vim text editor versions prior to 8.2. This allows attackers to execute arbitrary code by tri...
May 27, 2022CVE-2022-1898 is a use-after-free vulnerability in Vim text editor that allows attackers to execute arbitrary code by tricking users into opening spec...
May 27, 2022CVE-2022-26774 is a local privilege escalation vulnerability in iTunes for Windows. A local attacker can exploit this logic issue to gain elevated sys...
May 26, 2022CVE-2022-26775 is an integer overflow vulnerability in macOS that allows attackers to cause application crashes or execute arbitrary code. This affect...
May 26, 2022This is a buffer overflow vulnerability in macOS that allows applications to execute arbitrary code with kernel privileges. It affects macOS Monterey ...
May 26, 2022This memory corruption vulnerability in Apple's image processing allows attackers to execute arbitrary code by tricking users into opening malicious i...
May 26, 2022This is a buffer overflow vulnerability in macOS that allows an application to execute arbitrary code with kernel privileges. It affects macOS Montere...
May 26, 2022This is a macOS kernel vulnerability that allows an application to write data beyond allocated memory boundaries. Successful exploitation enables arbi...
May 26, 2022This is a memory corruption vulnerability in macOS that allows an application to execute arbitrary code with kernel privileges. It affects macOS Catal...
May 26, 2022This is a memory corruption vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel privileges. It a...
May 26, 2022This CVE-2022-26770 is an out-of-bounds read vulnerability in macOS that allows malicious applications to execute arbitrary code with kernel privilege...
May 26, 2022This is a memory corruption vulnerability in macOS that allows an application to execute arbitrary code with kernel privileges. It affects macOS Monte...
May 26, 2022CVE-2022-26739 is an out-of-bounds write vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel pri...
May 26, 2022This is a kernel-level buffer overflow vulnerability in macOS that allows malicious applications to execute arbitrary code with kernel privileges. It ...
May 26, 2022CVE-2022-26743 is an out-of-bounds write vulnerability in macOS that allows attackers who have already achieved code execution in macOS Recovery to es...
May 26, 2022This vulnerability in Xcode allows malicious applications to gain elevated privileges on macOS systems. It affects developers and users running vulner...
May 26, 2022CVE-2022-26738 is an out-of-bounds write vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel pri...
May 26, 2022This macOS vulnerability allows malicious applications to bypass symlink validation and gain elevated privileges. It affects macOS Monterey versions b...
May 26, 2022CVE-2022-26708 is a critical vulnerability in macOS that allows an attacker to cause application crashes or execute arbitrary code on affected systems...
May 26, 2022This is a memory corruption vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel privileges. It a...
May 26, 2022CVE-2022-26718 is an out-of-bounds read vulnerability in macOS that could allow an application to read memory beyond allocated boundaries. If exploite...
May 26, 2022CVE-2022-26721 is a memory initialization vulnerability in macOS that allows a malicious application to gain root privileges. This affects macOS Catal...
May 26, 2022This is a critical memory corruption vulnerability in macOS Samba client that allows arbitrary code execution when mounting a malicious Samba network ...
May 26, 2022CVE-2022-26736 is an out-of-bounds write vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel pri...
May 26, 2022This macOS vulnerability allows malicious plug-ins to inherit the host application's permissions and access user data without proper authorization. It...
May 26, 2022This vulnerability allows attackers to read memory outside intended boundaries when processing malicious AppleScript binary files. It affects macOS Ca...
May 26, 2022This CVE describes a race condition vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel privileg...
May 26, 2022CVE-2022-22672 is a memory corruption vulnerability in Apple operating systems that allows malicious applications to execute arbitrary code with kerne...
May 26, 2022CVE-2022-22675 is an out-of-bounds write vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel pri...
May 26, 2022CVE-2022-1735 is a classic buffer overflow vulnerability in Vim text editor versions prior to 8.2.4969. Attackers can exploit this by tricking users i...
May 17, 2022CVE-2022-1733 is a heap-based buffer overflow vulnerability in Vim text editor versions prior to 8.2.4968. Attackers can exploit this by tricking user...
May 17, 2022CVE-2022-1629 is a buffer over-read vulnerability in Vim's find_next_quote function that could allow attackers to crash the application, modify memory...
May 10, 2022This vulnerability is a buffer over-read in Ruby's String-to-Float conversion functions (Kernel#Float and String#to_f). It allows attackers to read me...
May 9, 2022CVE-2022-1619 is a heap-based buffer overflow vulnerability in Vim's command-line editing function that could allow attackers to crash the application...
May 8, 2022CVE-2022-1616 is a use-after-free vulnerability in Vim's append_command function that allows attackers to crash the application, bypass memory protect...
May 7, 2022CVE-2022-29458 is an out-of-bounds read vulnerability in ncurses' terminfo library that can cause segmentation faults and potentially lead to informat...
Apr 18, 2022CVE-2022-1381 is a heap buffer overflow vulnerability in Vim's skip_range function that allows attackers to crash the application, bypass memory prote...
Apr 18, 2022This CVE describes a use-after-free vulnerability in Subversion's mod_dav_svn module that can lead to memory corruption. When processing path-based au...
Apr 12, 2022Nokogiri versions before 1.13.4 contain an inefficient regular expression that causes excessive backtracking when detecting encoding in HTML documents...
Apr 11, 2022This vulnerability in zlib allows memory corruption during compression (deflating) when processing input with many distant matches. It affects any sof...
Mar 25, 2022This CVE-2022-22661 is a type confusion vulnerability in macOS that allows an application to execute arbitrary code with kernel privileges. It affects...
Mar 18, 2022CVE-2022-22665 is a privilege escalation vulnerability in macOS that allows malicious applications to gain root privileges through a logic issue. This...
Mar 18, 2022CVE-2022-22667 is a use-after-free vulnerability in iOS/iPadOS that allows malicious applications to execute arbitrary code with kernel privileges. Th...
Mar 18, 2022This vulnerability allows attackers to cause AppleScript binaries to read memory outside intended bounds, potentially leading to application crashes o...
Mar 18, 2022This CVE describes a privilege escalation vulnerability in Apple operating systems where a malicious application could gain elevated privileges due to...
Mar 18, 2022This is a buffer overflow vulnerability in Apple's iOS, iPadOS, and tvOS that allows malicious applications to execute arbitrary code with kernel priv...
Mar 18, 2022CVE-2022-22635 is an out-of-bounds write vulnerability in Apple's iOS, iPadOS, and tvOS that allows malicious applications to write beyond allocated m...
Mar 18, 2022Why Monitor Apple Security Vulnerabilities?
Real-time CVE tracking: Our automated system monitors 1,406+ known vulnerabilities affecting Apple products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.
Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Apple packages in under 60 seconds. No agents required - completely agentless scanning that works across Apple deployments.
Free vulnerability database: Access detailed information about every Apple CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.
🚀 Get Started in 60 Seconds
- Register free account & add your servers
- Run one-time scan or schedule automatic monitoring (every 1-24 hours)
- Receive instant alerts when new Apple CVEs affect your systems
- Access dashboard with severity breakdown & fix instructions