Apple Security Vulnerabilities (CVEs)
Track 1,406 security vulnerabilities affecting Apple products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.
CVE-2021-30809 is a use-after-free vulnerability in Apple's WebKit browser engine that allows arbitrary code execution when processing malicious web c...
Oct 28, 2021CVE-2021-30814 is a memory corruption vulnerability in Apple's image processing that allows arbitrary code execution when processing malicious images....
Oct 28, 2021CVE-2021-30818 is a type confusion vulnerability in Apple's WebKit browser engine that allows arbitrary code execution when processing malicious web c...
Oct 28, 2021CVE-2021-30832 is a memory corruption vulnerability in macOS that allows local attackers to escalate privileges. This affects macOS Catalina and Big S...
Oct 19, 2021This vulnerability allows a malicious application to execute arbitrary code with kernel privileges on affected Apple devices. It affects iOS, iPadOS, ...
Oct 19, 2021This vulnerability allows arbitrary code execution by processing a maliciously crafted dfont file. It affects Apple devices running vulnerable version...
Oct 19, 2021CVE-2021-30843 is a memory corruption vulnerability in Apple's dfont file processing that allows arbitrary code execution when a malicious dfont file ...
Oct 19, 2021This is a memory corruption vulnerability in Apple's WebKit browser engine that allows arbitrary code execution when processing malicious web content....
Oct 19, 2021CVE-2021-30848 is a memory corruption vulnerability in Apple's WebKit browser engine that allows remote code execution when processing malicious web c...
Oct 19, 2021A race condition vulnerability in macOS Catalina's NFS client allows attackers to execute arbitrary code with system privileges by mounting a maliciou...
Oct 19, 2021This is a memory corruption vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel privileges. It a...
Oct 19, 2021CVE-2021-30820 is a critical logic vulnerability in iOS/iPadOS that allows remote attackers to execute arbitrary code without user interaction. This a...
Oct 19, 2021This vulnerability in Apple's baseband firmware allows attackers to intercept and potentially manipulate cellular communications when integrity and ci...
Oct 19, 2021This CVE describes a URI parsing vulnerability in macOS that allows local users to execute arbitrary files. The issue affects macOS Catalina and Big S...
Oct 19, 2021This memory corruption vulnerability in macOS allows attackers in a privileged network position to execute arbitrary code on affected systems. It affe...
Sep 8, 2021This macOS vulnerability allows local users to read kernel memory or cause system crashes through an out-of-bounds read. It affects macOS systems prio...
Sep 8, 2021This CVE describes a null pointer dereference vulnerability in Apple's macOS, iOS, iPadOS, and Safari that could allow a remote attacker to cause a de...
Sep 8, 2021This vulnerability allows arbitrary code execution by processing a maliciously crafted image on Apple devices. It affects users running vulnerable ver...
Sep 8, 2021This CVE describes a double free vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel privileges....
Sep 8, 2021This vulnerability allows arbitrary code execution by processing a maliciously crafted audio file. It affects Apple devices running macOS, tvOS, watch...
Sep 8, 2021This memory corruption vulnerability in Apple operating systems allows malicious applications to cause denial of service or potentially leak memory co...
Sep 8, 2021This macOS vulnerability allows malicious applications to bypass Privacy preferences, potentially accessing protected data without user consent. It af...
Sep 8, 2021This vulnerability in Apple operating systems allows processing a maliciously crafted message to cause a denial of service. It affects users running v...
Sep 8, 2021CVE-2021-30675 is a memory corruption vulnerability in Apple's Boot Camp software that allows a malicious application to elevate privileges. This affe...
Sep 8, 2021CVE-2021-30677 is a sandbox escape vulnerability in Apple operating systems that allows malicious applications to break out of their security sandbox ...
Sep 8, 2021CVE-2021-30678 is a critical logic vulnerability in macOS that allows remote attackers to cause application crashes or execute arbitrary code. This af...
Sep 8, 2021This macOS vulnerability allows a local user to bypass Apple's security policy and load unsigned kernel extensions (KEXTs). This affects macOS systems...
Sep 8, 2021This is a use-after-free memory corruption vulnerability in macOS that allows malicious applications to execute arbitrary code. It affects macOS Big S...
Sep 8, 2021This macOS vulnerability allows malicious applications to escape their sandbox restrictions, potentially accessing system resources or other applicati...
Sep 8, 2021This CVE addresses multiple security vulnerabilities in Apache HTTP Server that could allow remote code execution or denial of service. The vulnerabil...
Sep 8, 2021This vulnerability allows arbitrary code execution by processing a maliciously crafted image. It affects macOS, iOS, and iPadOS systems with insuffici...
Sep 8, 2021This macOS vulnerability allows applications to execute arbitrary code with system privileges, potentially leading to complete system compromise. It a...
Sep 8, 2021This vulnerability allows a malicious application to read kernel memory beyond intended boundaries, potentially exposing sensitive system information....
Sep 8, 2021CVE-2021-30662 is a file processing vulnerability in Apple iOS and iPadOS that allows arbitrary code execution when processing malicious files. This a...
Sep 8, 2021This CVE describes an out-of-bounds write vulnerability in Apple operating systems that could allow arbitrary code execution when processing malicious...
Sep 8, 2021This is a memory corruption vulnerability in Apple's WebKit browser engine that allows arbitrary code execution when processing malicious web content....
Sep 8, 2021This memory corruption vulnerability in macOS allows malicious applications to gain root privileges through improper state management. It affects macO...
Sep 8, 2021CVE-2021-1874 is a privilege escalation vulnerability in iOS and iPadOS that allows malicious applications to execute arbitrary code with kernel privi...
Sep 8, 2021This is a use-after-free vulnerability in macOS that allows arbitrary code execution when processing malicious web content. Attackers can exploit this...
Sep 8, 2021CVE-2021-1880 is a memory corruption vulnerability in Apple's image processing that allows arbitrary code execution when processing malicious images. ...
Sep 8, 2021CVE-2021-1882 is a critical memory corruption vulnerability in Apple operating systems that allows an application to gain elevated privileges. This af...
Sep 8, 2021This vulnerability allows attackers to execute arbitrary code by tricking users into processing a maliciously crafted image. It affects Apple devices ...
Sep 8, 2021This CVE describes a race condition vulnerability in Apple operating systems that allows malicious applications to gain root privileges. It affects ma...
Sep 8, 2021This is a memory corruption vulnerability in macOS that allows arbitrary code execution when opening malicious files. It affects macOS Big Sur, Catali...
Sep 8, 2021This vulnerability allows malicious applications to bypass code signature validation checks, potentially circumventing macOS and iOS privacy preferenc...
Sep 8, 2021CVE-2021-1853 is a local privilege escalation vulnerability in macOS that allows an attacker with local access to gain elevated system privileges. Thi...
Sep 8, 2021This vulnerability allows arbitrary code execution by processing a maliciously crafted image file. It affects Apple devices running outdated operating...
Sep 8, 2021This is a use-after-free vulnerability in Apple's iOS, iPadOS, watchOS, and tvOS that allows an attacker with JavaScript execution capability to poten...
Sep 8, 2021CVE-2021-1867 is an out-of-bounds read vulnerability in Apple's iOS, iPadOS, and macOS that allows malicious applications to execute arbitrary code wi...
Sep 8, 2021This is a macOS kernel memory corruption vulnerability that allows an application to cause system crashes or write to kernel memory. It affects macOS ...
Sep 8, 2021Why Monitor Apple Security Vulnerabilities?
Real-time CVE tracking: Our automated system monitors 1,406+ known vulnerabilities affecting Apple products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.
Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Apple packages in under 60 seconds. No agents required - completely agentless scanning that works across Apple deployments.
Free vulnerability database: Access detailed information about every Apple CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.
🚀 Get Started in 60 Seconds
- Register free account & add your servers
- Run one-time scan or schedule automatic monitoring (every 1-24 hours)
- Receive instant alerts when new Apple CVEs affect your systems
- Access dashboard with severity breakdown & fix instructions