Apple Security Vulnerabilities (CVEs)
Track 1,429 security vulnerabilities affecting Apple products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.
CVE-2020-36330 is an out-of-bounds read vulnerability in libwebp versions before 1.0.1, allowing attackers to read sensitive memory data or cause deni...
May 21, 2021CVE-2020-25709 is an assertion failure vulnerability in OpenLDAP's slapd server that allows remote attackers to crash the service by sending specially...
May 18, 2021CVE-2021-1805 is an out-of-bounds write vulnerability in macOS that allows an application to execute arbitrary code with kernel privileges. This affec...
Apr 2, 2021CVE-2021-1818 is a critical logic vulnerability in Apple operating systems that allows remote attackers to cause application crashes or execute arbitr...
Apr 2, 2021CVE-2021-1870 is a critical logic vulnerability in Apple operating systems that allows remote attackers to execute arbitrary code on affected devices....
Apr 2, 2021CVE-2021-1794 is a critical out-of-bounds read vulnerability in iOS/iPadOS that allows remote attackers to potentially execute arbitrary code on affec...
Apr 2, 2021CVE-2021-1796 is a critical out-of-bounds write vulnerability in iOS and iPadOS that allows remote attackers to execute arbitrary code on affected dev...
Apr 2, 2021CVE-2021-1802 is a local privilege escalation vulnerability in macOS that allows an attacker with local access to gain elevated system privileges. Thi...
Apr 2, 2021CVE-2021-1753 is an out-of-bounds read vulnerability in Apple's image processing that could allow arbitrary code execution when processing a malicious...
Apr 2, 2021This vulnerability allows attackers to execute arbitrary code by tricking users into processing malicious font files. It affects macOS systems running...
Apr 2, 2021This vulnerability allows malicious applications to execute arbitrary code with system privileges on macOS systems due to a logic error in kernel exte...
Apr 2, 2021CVE-2021-1782 is a race condition vulnerability in Apple operating systems that allows malicious applications to elevate privileges. This affects macO...
Apr 2, 2021CVE-2021-1785 is an out-of-bounds read vulnerability in Apple's image processing that could allow arbitrary code execution when processing malicious i...
Apr 2, 2021CVE-2021-1787 is a privilege escalation vulnerability in Apple operating systems that allows a local attacker to gain elevated privileges. This affect...
Apr 2, 2021CVE-2021-1789 is a type confusion vulnerability in Apple's WebKit browser engine that allows arbitrary code execution when processing malicious web co...
Apr 2, 2021CVE-2021-1792 is an out-of-bounds read vulnerability in Apple operating systems that could allow remote attackers to execute arbitrary code. This affe...
Apr 2, 2021This vulnerability allows attackers to execute arbitrary code by tricking users into processing maliciously crafted images. It affects macOS, iOS, iPa...
Apr 2, 2021This vulnerability allows attackers to execute arbitrary code or crash applications by tricking users into opening malicious USD (Universal Scene Desc...
Apr 2, 2021A heap corruption vulnerability in Apple's image processing libraries allows attackers to execute arbitrary code by tricking users into opening malici...
Apr 2, 2021This vulnerability allows arbitrary code execution through a stack overflow when processing malicious text files. It affects macOS, iOS, iPadOS, tvOS,...
Apr 2, 2021CVE-2021-1774 is a memory corruption vulnerability in Apple's image processing that allows arbitrary code execution when processing malicious images. ...
Apr 2, 2021CVE-2021-1776 is an out-of-bounds write vulnerability in Apple's font processing that allows arbitrary code execution when processing malicious font f...
Apr 2, 2021CVE-2021-1738 is an out-of-bounds write vulnerability in macOS image processing that could allow arbitrary code execution when processing a malicious ...
Apr 2, 2021CVE-2021-1742 is a memory corruption vulnerability in Apple's image processing that allows arbitrary code execution when processing a maliciously craf...
Apr 2, 2021This vulnerability allows arbitrary code execution through malicious image processing. An attacker can craft a malicious image that triggers an out-of...
Apr 2, 2021CVE-2021-1746 is a vulnerability in Apple's image processing that allows arbitrary code execution when processing a maliciously crafted image. This af...
Apr 2, 2021This vulnerability allows arbitrary JavaScript code execution when processing malicious URLs due to improper input validation. It affects Apple iOS, i...
Apr 2, 2021This vulnerability allows attackers to execute arbitrary code on macOS systems by tricking users into mounting a malicious Samba network share. It aff...
Apr 2, 2021CVE-2021-1757 is an out-of-bounds read vulnerability in Apple operating systems that allows a local attacker to potentially elevate their privileges. ...
Apr 2, 2021This macOS authentication bypass vulnerability allows attackers in a privileged network position to circumvent authentication policies. It affects mul...
Apr 2, 2021CVE-2020-9926 is a use-after-free vulnerability in Apple's XML processing that could allow attackers to crash applications or execute arbitrary code b...
Apr 2, 2021This vulnerability allows arbitrary code execution by processing a maliciously crafted image due to an out-of-bounds write issue. It affects Apple dev...
Apr 2, 2021CVE-2020-9960 is an out-of-bounds read vulnerability in Apple's audio file processing that could allow arbitrary code execution when processing malici...
Apr 2, 2021CVE-2020-9967 is a kernel memory corruption vulnerability in Apple's XNU network stack that allows remote attackers to cause system crashes or corrupt...
Apr 2, 2021This is a use-after-free vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel privileges. It affe...
Apr 2, 2021This vulnerability allows attackers to execute arbitrary code by tricking users into processing maliciously crafted images. It affects macOS systems r...
Apr 2, 2021This vulnerability allows arbitrary code execution by processing a maliciously crafted image due to an out-of-bounds write memory corruption issue. It...
Apr 2, 2021CVE-2020-29614 is a heap corruption vulnerability in Apple operating systems that allows attackers to execute arbitrary code by tricking users into op...
Apr 2, 2021This memory corruption vulnerability in macOS image processing allows attackers to execute arbitrary code by tricking users into opening maliciously c...
Apr 2, 2021CVE-2020-29618 is an out-of-bounds read vulnerability in Apple's image processing that could allow arbitrary code execution when processing malicious ...
Apr 2, 2021This macOS vulnerability allows malicious applications to bypass security restrictions and gain elevated privileges. It affects macOS systems running ...
Apr 2, 2021This memory corruption vulnerability in Apple's font processing allows attackers to execute arbitrary code by tricking users into opening malicious fo...
Apr 2, 2021CVE-2020-27936 is an out-of-bounds read vulnerability in macOS kernel memory that allows local users to read kernel memory or cause system crashes. Th...
Apr 2, 2021CVE-2020-27938 is a privilege escalation vulnerability in macOS that allows malicious applications to gain elevated system privileges. This affects ma...
Apr 2, 2021This macOS kernel vulnerability allows malicious applications to execute arbitrary code with kernel privileges, potentially taking full control of aff...
Apr 2, 2021CVE-2020-27944 is a memory corruption vulnerability in Apple's font processing that allows arbitrary code execution when processing malicious font fil...
Apr 2, 2021This is a memory corruption vulnerability in macOS kernel that allows an application to execute arbitrary code with kernel privileges. It affects macO...
Apr 2, 2021CVE-2020-27951 is a vulnerability in Apple operating systems that allows unauthorized code execution, potentially leading to authentication policy vio...
Apr 2, 2021CVE-2020-27897 is an out-of-bounds write vulnerability in macOS that allows an application to execute arbitrary code with kernel privileges. This affe...
Apr 2, 2021This is a memory corruption vulnerability in macOS kernel that allows an application to execute arbitrary code with kernel privileges. It affects macO...
Apr 2, 2021Why Monitor Apple Security Vulnerabilities?
Real-time CVE tracking: Our automated system monitors 1,429+ known vulnerabilities affecting Apple products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.
Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Apple packages in under 60 seconds. No agents required - completely agentless scanning that works across Apple deployments.
Free vulnerability database: Access detailed information about every Apple CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.
🚀 Get Started in 60 Seconds
- Register free account & add your servers
- Run one-time scan or schedule automatic monitoring (every 1-24 hours)
- Receive instant alerts when new Apple CVEs affect your systems
- Access dashboard with severity breakdown & fix instructions