Apple Security Vulnerabilities (CVEs)

Track 1,430 security vulnerabilities affecting Apple products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.

181 Critical
808 High
412 Medium
29 Low
🔔 Get Alerts for Apple
CVE-2019-8828 7.8

This is a memory corruption vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel privileges. It a...

Oct 27, 2020
CVE-2019-8830 8.8

CVE-2019-8830 is an out-of-bounds read vulnerability in Apple's FaceTime video processing that could allow arbitrary code execution when processing ma...

Oct 27, 2020
CVE-2019-8832 7.8

This memory corruption vulnerability in Apple operating systems allows malicious applications to execute arbitrary code with system privileges. It aff...

Oct 27, 2020
CVE-2019-8835 8.8

This vulnerability allows attackers to execute arbitrary code on affected Apple devices by tricking users into processing malicious web content. It af...

Oct 27, 2020
CVE-2019-8837 7.8

This macOS vulnerability allows malicious applications to bypass file access restrictions and read protected files. It affects macOS High Sierra, Moja...

Oct 27, 2020
CVE-2019-8767 9.8

CVE-2019-8767 is a critical heap corruption vulnerability in macOS that allows attackers to execute arbitrary code or cause denial of service by proce...

Oct 27, 2020
CVE-2019-8773 8.8

CVE-2019-8773 is a memory corruption vulnerability in Apple's WebKit browser engine that allows arbitrary code execution when processing malicious web...

Oct 27, 2020
CVE-2019-8776 7.8

CVE-2019-8776 is a memory corruption vulnerability in macOS that allows an application to execute arbitrary code with system privileges. This affects ...

Oct 27, 2020
CVE-2019-8824 7.8

This memory corruption vulnerability in macOS allows malicious applications to execute arbitrary code with kernel privileges, potentially taking full ...

Oct 27, 2020
CVE-2019-8734 8.8

CVE-2019-8734 is a memory corruption vulnerability in Apple's WebKit browser engine that allows arbitrary code execution when processing malicious web...

Oct 27, 2020
CVE-2019-8740 7.8

This memory corruption vulnerability in Apple's iOS, iPadOS, watchOS, and tvOS allows malicious applications to execute arbitrary code with kernel pri...

Oct 27, 2020
CVE-2019-8746 9.8

CVE-2019-8746 is a critical out-of-bounds read vulnerability in multiple Apple products that allows remote attackers to cause application crashes or e...

Oct 27, 2020
CVE-2019-8751 8.8

CVE-2019-8751 is a memory corruption vulnerability in Apple's WebKit browser engine that allows arbitrary code execution when processing malicious web...

Oct 27, 2020
CVE-2019-8756 9.8

CVE-2019-8756 is a critical memory corruption vulnerability in libxml2 affecting multiple Apple products. It allows attackers to execute arbitrary cod...

Oct 27, 2020
CVE-2019-8675 8.8

CVE-2019-8675 is a buffer overflow vulnerability in macOS that allows attackers in a privileged network position to execute arbitrary code. This affec...

Oct 27, 2020
CVE-2019-8696 8.8

A buffer overflow vulnerability in macOS allows attackers in a privileged network position to execute arbitrary code. This affects macOS systems befor...

Oct 27, 2020
CVE-2019-8709 7.8

This is a memory corruption vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel privileges. It a...

Oct 27, 2020
CVE-2019-8712 9.8

CVE-2019-8712 is a critical memory corruption vulnerability in Apple operating systems that allows an application to execute arbitrary code with syste...

Oct 27, 2020
CVE-2019-8716 9.8

CVE-2019-8716 is a critical memory corruption vulnerability in macOS that allows an application to execute arbitrary code with system privileges. This...

Oct 27, 2020
CVE-2019-8728 8.8

CVE-2019-8728 is a memory corruption vulnerability in Apple's WebKit browser engine that allows arbitrary code execution when processing malicious web...

Oct 27, 2020
CVE-2019-8618 7.5

CVE-2019-8618 is a sandbox escape vulnerability affecting Apple operating systems. A sandboxed process could bypass security restrictions, potentially...

Oct 27, 2020
CVE-2019-8633 7.5

This CVE describes an input validation vulnerability in Apple operating systems that allows applications to read restricted memory. Successful exploit...

Oct 27, 2020
CVE-2019-8639 8.8

CVE-2019-8639 is a memory corruption vulnerability in Apple's WebKit browser engine that allows attackers to execute arbitrary code on affected device...

Oct 27, 2020
CVE-2019-8539 7.8

CVE-2019-8539 is a memory initialization vulnerability in macOS that allows a malicious application to execute arbitrary code with system privileges. ...

Oct 27, 2020
CVE-2019-8547 9.8

CVE-2019-8547 is an out-of-bounds read vulnerability in Apple operating systems that allows remote attackers to leak kernel memory. This could expose ...

Oct 27, 2020
CVE-2019-8572 9.8

CVE-2019-8572 is a critical null pointer dereference vulnerability in Apple AirPort Base Station firmware that allows remote attackers to execute arbi...

Oct 27, 2020
CVE-2019-8575 7.5

CVE-2019-8575 is a data deletion vulnerability in Apple AirPort base stations where performing a factory reset may not properly erase all user informa...

Oct 27, 2020
CVE-2019-8578 9.8

CVE-2019-8578 is a use-after-free vulnerability in Apple AirPort Base Station firmware that allows remote attackers to execute arbitrary code on affec...

Oct 27, 2020
CVE-2019-8580 7.5

CVE-2019-8580 is a vulnerability in Apple AirPort base stations where source-routed IPv4 packets were unexpectedly accepted despite being disabled by ...

Oct 27, 2020
CVE-2019-8581 9.8

CVE-2019-8581 is an out-of-bounds read vulnerability in Apple AirPort Base Station firmware that allows remote attackers to leak memory contents. This...

Oct 27, 2020
CVE-2019-8588 7.5

CVE-2019-8588 is a null pointer dereference vulnerability in Apple AirPort Base Station firmware that allows remote attackers to cause denial of servi...

Oct 27, 2020
CVE-2018-4467 7.8

CVE-2018-4467 is a memory corruption vulnerability in macOS that allows malicious applications to elevate privileges. This affects macOS systems runni...

Oct 27, 2020
CVE-2018-4474 7.5

CVE-2018-4474 is a memory consumption vulnerability in multiple Apple products that could allow an attacker to cause denial of service through resourc...

Oct 27, 2020
CVE-2019-7288 9.8

This vulnerability in Apple's FaceTime service allowed attackers to potentially access Live Photos data without proper authorization. It affected macO...

Oct 27, 2020
CVE-2019-8509 7.8

CVE-2019-8509 is a privilege escalation vulnerability in macOS that allows malicious applications to gain elevated privileges. This affects macOS syst...

Oct 27, 2020
CVE-2018-4296 9.8

CVE-2018-4296 is a critical privilege escalation vulnerability in macOS DiskArbitration framework that allows local attackers to gain root privileges....

Oct 27, 2020
CVE-2018-4428 7.1

CVE-2018-4428 is an iOS lock screen vulnerability that allowed attackers with physical access to a locked device to use the share function to potentia...

Oct 27, 2020
CVE-2018-4451 7.8

CVE-2018-4451 is a memory corruption vulnerability in macOS that could allow an attacker to execute arbitrary code on affected systems. The vulnerabil...

Oct 27, 2020
CVE-2020-9928 7.8

This macOS kernel vulnerability allows malicious applications to execute arbitrary code with kernel privileges through memory corruption. It affects m...

Oct 22, 2020
CVE-2020-9937 7.8

CVE-2020-9937 is an out-of-bounds write vulnerability in Apple's image processing components that could allow arbitrary code execution when processing...

Oct 22, 2020
CVE-2020-9940 7.8

This vulnerability allows attackers to execute arbitrary code or crash applications by tricking users into opening malicious USD (Universal Scene Desc...

Oct 22, 2020
CVE-2020-9984 7.8

This vulnerability allows attackers to execute arbitrary code by tricking users into processing maliciously crafted images. It affects Apple iOS, iPad...

Oct 22, 2020
CVE-2020-9990 7.8

This macOS kernel vulnerability allows a malicious application to exploit a race condition to execute arbitrary code with kernel privileges. It affect...

Oct 22, 2020
CVE-2020-9901 7.8

CVE-2020-9901 is a privilege escalation vulnerability in Apple's path validation logic for symbolic links. A local attacker could exploit improper sym...

Oct 22, 2020
CVE-2020-9904 7.8

This is a memory corruption vulnerability in Apple's iOS, iPadOS, macOS, tvOS, and watchOS that allows an application to execute arbitrary code with k...

Oct 22, 2020
CVE-2020-9906 9.1

This CVE describes a memory corruption vulnerability in Apple's kernel that allows remote attackers to cause system crashes or corrupt kernel memory. ...

Oct 22, 2020
CVE-2020-9919 7.8

This CVE describes a buffer overflow vulnerability in Apple's image processing components across multiple platforms. Attackers can exploit it by craft...

Oct 22, 2020
CVE-2020-9920 9.1

This vulnerability allows a malicious mail server to overwrite arbitrary files on Apple devices through a path handling issue in mail processing. It a...

Oct 22, 2020
CVE-2020-9924 7.5

A logic issue in macOS state management allows remote attackers to cause denial of service. This affects macOS systems before Catalina 10.15.6. The vu...

Oct 22, 2020
CVE-2020-9882 7.8

This CVE describes a buffer overflow vulnerability in Apple's USD file processing that could allow arbitrary code execution when opening malicious fil...

Oct 22, 2020

Why Monitor Apple Security Vulnerabilities?

Real-time CVE tracking: Our automated system monitors 1,430+ known vulnerabilities affecting Apple products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.

Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Apple packages in under 60 seconds. No agents required - completely agentless scanning that works across Apple deployments.

Free vulnerability database: Access detailed information about every Apple CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.

🚀 Get Started in 60 Seconds

  • Register free account & add your servers
  • Run one-time scan or schedule automatic monitoring (every 1-24 hours)
  • Receive instant alerts when new Apple CVEs affect your systems
  • Access dashboard with severity breakdown & fix instructions
Start Monitoring Apple CVEs Free