Apple Security Vulnerabilities (CVEs)
Track 1,407 security vulnerabilities affecting Apple products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.
This vulnerability allows malicious OSAX scripting additions to bypass macOS Gatekeeper security checks and sandbox restrictions, potentially enabling...
Aug 24, 2021This CVE describes a buffer overflow vulnerability in macOS that allows malicious applications to execute arbitrary code with kernel privileges. It af...
Aug 24, 2021This CVE describes a buffer overflow vulnerability in Apple's USD file processing that could allow attackers to crash applications or execute arbitrar...
Aug 24, 2021This CVE-2021-30981 is a buffer overflow vulnerability in macOS that allows an application to execute arbitrary code with kernel privileges. It affect...
Aug 24, 2021This CVE describes a buffer overflow vulnerability in iOS/iPadOS that allows malicious applications to execute arbitrary code with kernel privileges. ...
Aug 24, 2021This vulnerability allows malicious iOS/iPadOS applications to write data beyond allocated memory boundaries, potentially leading to arbitrary code ex...
Aug 24, 2021This vulnerability allows a malicious application to execute arbitrary code with kernel privileges on iOS/iPadOS devices. An out-of-bounds read in the...
Aug 24, 2021This CVE describes a buffer overflow vulnerability in Apple's audio file processing components. Attackers can exploit it by crafting malicious audio f...
Aug 24, 2021This CVE describes a logic flaw in Apple's proxy auto-configuration (PAC) implementation that could cause user traffic to be sent to unintended proxy ...
Aug 24, 2021This macOS vulnerability allows malicious URLs to trigger unexpected JavaScript execution from local files. Attackers could potentially execute arbitr...
Aug 24, 2021This vulnerability allows attackers to execute arbitrary code or crash applications by tricking users into opening malicious USD (Universal Scene Desc...
Aug 24, 2021This vulnerability allows attackers to execute arbitrary code by tricking users into processing maliciously crafted images. It affects Apple devices r...
Aug 24, 2021This memory corruption vulnerability in Apple's ColorSync ICC profile processing allows arbitrary code execution when processing malicious images. It ...
Aug 24, 2021This is a local privilege escalation vulnerability in Apple operating systems that allows an attacker with existing local access to gain elevated priv...
Aug 24, 2021This CVE describes a memory corruption vulnerability in Apple's XNU kernel that allows a malicious application to execute arbitrary code with kernel p...
Aug 24, 2021This is a use-after-free vulnerability in Apple's WebKit browser engine that could allow arbitrary code execution when processing malicious web conten...
Aug 24, 2021This vulnerability allows attackers to execute arbitrary code on affected Apple devices by tricking users into visiting malicious web pages. It affect...
Aug 24, 2021This CVE describes a race condition vulnerability in Apple operating systems that allows malicious applications to execute arbitrary code with kernel ...
Aug 24, 2021This CVE describes a use-after-free vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel privileg...
Aug 24, 2021This macOS kernel vulnerability allows malicious applications to exploit a race condition to execute arbitrary code with kernel privileges. It affects...
Aug 24, 2021This macOS kernel vulnerability allows malicious applications to execute arbitrary code with kernel privileges, potentially gaining full system contro...
Aug 24, 2021This is a memory corruption vulnerability in Apple's XNU kernel that allows a malicious application to execute arbitrary code with kernel privileges. ...
Aug 24, 2021This is a memory corruption vulnerability in iOS/iPadOS that allows malicious applications to execute arbitrary code with kernel privileges. It affect...
Aug 24, 2021CVE-2021-30916 is a memory corruption vulnerability in Apple operating systems that allows malicious applications to execute arbitrary code with kerne...
Aug 24, 2021This vulnerability allows arbitrary code execution through malicious PDF files due to an out-of-bounds write in Apple's PDF processing. It affects mul...
Aug 24, 2021This CVE describes multiple out-of-bounds write vulnerabilities in macOS that could allow a malicious application to execute arbitrary code with kerne...
Aug 24, 2021This CVE describes a denial-of-service vulnerability in macOS that allows a remote attacker to cause affected devices to unexpectedly restart. The iss...
Aug 24, 2021This vulnerability allows malicious applications to bypass privacy preferences on Apple devices, potentially accessing sensitive user data without pro...
Aug 24, 2021This vulnerability allows malicious applications to write data beyond allocated memory boundaries in macOS kernel components, potentially leading to a...
Aug 24, 2021This vulnerability allows a local attacker to cause application crashes or execute arbitrary code on affected Apple devices. It affects iOS, iPadOS, a...
Aug 24, 2021CVE-2021-30906 is a local privilege escalation vulnerability in Apple operating systems that allows an attacker with local access to gain elevated sys...
Aug 24, 2021This CVE-2021-30909 is a memory corruption vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel p...
Aug 24, 2021CVE-2021-30894 is a memory corruption vulnerability in Apple iOS, iPadOS, and tvOS that allows malicious applications to execute arbitrary code with k...
Aug 24, 2021This CVE describes a race condition vulnerability in macOS that allows a malicious application to execute arbitrary code with kernel privileges. It af...
Aug 24, 2021This vulnerability allows attackers to read memory outside intended boundaries when processing malicious AppleScript binary files. It affects macOS sy...
Aug 24, 2021This vulnerability allows arbitrary code execution when processing malicious archive files on Apple devices. Attackers can exploit this by tricking us...
Aug 24, 2021This is a memory corruption vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel privileges. It a...
Aug 24, 2021CVE-2021-30886 is a use-after-free vulnerability in Apple operating systems that allows malicious applications to execute arbitrary code with kernel p...
Aug 24, 2021This vulnerability allows malicious websites to bypass Content Security Policy (CSP) protections and leak sensitive information through redirect behav...
Aug 24, 2021CVE-2021-30868 is a macOS kernel race condition vulnerability that allows malicious applications to execute arbitrary code with kernel privileges. Thi...
Aug 24, 2021CVE-2021-30873 is a privilege escalation vulnerability in macOS that allows malicious applications to gain elevated system privileges. This affects ma...
Aug 24, 2021CVE-2021-30876 is an out-of-bounds read vulnerability in AppleScript binary processing on macOS. Attackers can craft malicious AppleScript binaries to...
Aug 24, 2021This macOS vulnerability allows malicious unsandboxed applications to bypass Privacy preferences when Remote Login is enabled. Attackers could gain un...
Aug 24, 2021This is a use-after-free vulnerability in Apple's WebKit browser engine that allows arbitrary code execution when processing malicious web content. It...
Aug 24, 2021This vulnerability allows arbitrary code execution when processing malicious PDF files due to an integer overflow in Apple's PDF processing components...
Aug 24, 2021This macOS vulnerability allows sandboxed applications to escape their security restrictions, potentially accessing system resources they shouldn't. I...
Aug 24, 2021CVE-2021-30851 is a memory corruption vulnerability in Apple's WebKit browser engine that could allow remote code execution when processing malicious ...
Aug 24, 2021This vulnerability allows sandboxed processes on Apple devices to bypass security restrictions, potentially accessing resources they shouldn't. It aff...
Aug 24, 2021Multiple integer overflow vulnerabilities in the file command's CDF parsing functions allow memory corruption when processing malicious files. This af...
Jun 2, 2021CVE-2020-36329 is a use-after-free vulnerability in libwebp that allows attackers to execute arbitrary code or cause denial of service. This affects a...
May 21, 2021Why Monitor Apple Security Vulnerabilities?
Real-time CVE tracking: Our automated system monitors 1,407+ known vulnerabilities affecting Apple products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.
Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Apple packages in under 60 seconds. No agents required - completely agentless scanning that works across Apple deployments.
Free vulnerability database: Access detailed information about every Apple CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.
🚀 Get Started in 60 Seconds
- Register free account & add your servers
- Run one-time scan or schedule automatic monitoring (every 1-24 hours)
- Receive instant alerts when new Apple CVEs affect your systems
- Access dashboard with severity breakdown & fix instructions