Apple Security Vulnerabilities (CVEs)
Track 1,430 security vulnerabilities affecting Apple products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.
This vulnerability allows arbitrary code execution on macOS systems by viewing a malicious JPEG file. Attackers can exploit memory corruption in the i...
Oct 22, 2020CVE-2020-9898 is a sandbox escape vulnerability in Apple operating systems that allows a sandboxed process to bypass security restrictions. This affec...
Oct 22, 2020This vulnerability allows a local attacker to bypass symlink path validation, potentially gaining elevated privileges on affected Apple devices. It af...
Oct 22, 2020This vulnerability allows an attacker to impersonate trusted websites by exploiting a certificate validation flaw in administrator-added certificates....
Oct 22, 2020This vulnerability allows arbitrary code execution by processing a maliciously crafted image due to an out-of-bounds write memory corruption issue. It...
Oct 22, 2020This vulnerability allows arbitrary code execution when processing maliciously crafted images due to an out-of-bounds read. It affects multiple Apple ...
Oct 22, 2020An integer overflow vulnerability in Apple's image processing components allows arbitrary code execution when processing malicious images. This affect...
Oct 22, 2020CVE-2020-9877 is an out-of-bounds read vulnerability in Apple's image processing that could allow arbitrary code execution when processing malicious i...
Oct 22, 2020This CVE describes a buffer overflow vulnerability in Apple's USD file processing that could allow arbitrary code execution. Attackers can exploit thi...
Oct 22, 2020CVE-2020-3915 is a path handling vulnerability in macOS that allows malicious applications to overwrite arbitrary files on the system. This affects ma...
Oct 22, 2020This macOS vulnerability allows a user to bypass file system protections and access restricted areas. It affects macOS Catalina versions before 10.15....
Oct 22, 2020CVE-2020-9779 is an out-of-bounds read vulnerability in macOS kernel memory handling that allows a local user to read kernel memory or cause system cr...
Oct 22, 2020This macOS kernel vulnerability allows a malicious application to exploit a race condition to execute arbitrary code with kernel privileges. It affect...
Oct 22, 2020CVE-2020-9828 is an out-of-bounds read vulnerability in macOS that allows a remote attacker to potentially leak sensitive user information. This affec...
Oct 22, 2020This CVE describes a privilege escalation vulnerability in Apple operating systems where a malicious application could bypass security restrictions an...
Oct 22, 2020CVE-2020-9983 is an out-of-bounds write vulnerability in Safari that allows remote code execution when processing malicious web content. Attackers can...
Oct 16, 2020This vulnerability allows a remote attacker to cause a denial of service on affected Apple iOS and iPadOS devices. The specific attack vector is not p...
Oct 16, 2020CVE-2020-9918 is a critical kernel vulnerability in Apple operating systems that allows remote attackers to read beyond allocated memory boundaries. T...
Oct 16, 2020This vulnerability allows a remote attacker to cause denial of service by sending specially crafted input to iOS/iPadOS devices, leading to unexpected...
Oct 16, 2020CVE-2020-9936 is an out-of-bounds write vulnerability in Apple's image processing components, allowing arbitrary code execution when a malicious image...
Oct 16, 2020CVE-2020-9948 is a type confusion vulnerability in Safari's WebKit engine that allows malicious web content to trigger memory corruption. Successful e...
Oct 16, 2020CVE-2020-9952 is a cross-site scripting (XSS) vulnerability in Apple's web content processing components. It allows attackers to execute malicious scr...
Oct 16, 2020This vulnerability allows attackers to execute arbitrary code by tricking users into opening malicious audio files. It affects Apple devices running o...
Oct 16, 2020CVE-2020-9893 is a use-after-free vulnerability in Apple's memory management that could allow a remote attacker to crash applications or execute arbit...
Oct 16, 2020This is a critical use-after-free memory corruption vulnerability in Apple's iOS, iPadOS, tvOS, watchOS, Safari, iTunes, and iCloud for Windows. A rem...
Oct 16, 2020CVE-2020-9907 is a memory corruption vulnerability in Apple iOS, iPadOS, and tvOS that allows malicious applications to execute arbitrary code with ke...
Oct 16, 2020This vulnerability allows a malicious attacker with arbitrary read/write capability to bypass Pointer Authentication mechanisms in Apple operating sys...
Oct 16, 2020This CVE describes a Bluetooth input validation vulnerability in Apple devices that allows attackers in a privileged network position to send malforme...
Oct 16, 2020This macOS kernel vulnerability allows malicious applications to execute arbitrary code with kernel privileges, enabling complete system compromise. I...
Oct 16, 2020This vulnerability allows an attacker with memory write capability to bypass pointer authentication codes, potentially enabling arbitrary code executi...
Oct 16, 2020This vulnerability allows attackers to execute arbitrary code by tricking users into processing a malicious audio file. It affects Apple devices runni...
Oct 16, 2020This vulnerability allows attackers to execute arbitrary code by tricking users into processing a malicious audio file. It affects Apple iOS, iPadOS, ...
Oct 16, 2020CVE-2020-9799 is an out-of-bounds read vulnerability in macOS that allows malicious applications to execute arbitrary code with kernel privileges. Thi...
Oct 16, 2020This vulnerability in libpcre (PCRE library) allows attackers to read beyond allocated memory buffers when processing certain regular expressions with...
Jun 15, 2020CVE-2020-9847 is an out-of-bounds read vulnerability in macOS that allows malicious applications to potentially escape their sandbox restrictions. Thi...
Jun 9, 2020This is a critical remote code execution vulnerability affecting multiple Apple products. A logic issue allows remote attackers to execute arbitrary c...
Jun 9, 2020This CVE describes an integer overflow vulnerability in Apple operating systems that allows malicious applications to execute arbitrary code with kern...
Jun 9, 2020This vulnerability in Windows Migration Assistant allows attackers to execute arbitrary code by tricking users into running the installer from an untr...
Jun 9, 2020This is a memory corruption vulnerability in Apple's iOS, iPadOS, and macOS that allows an application to execute arbitrary code with kernel privilege...
Jun 9, 2020This is a memory corruption vulnerability in macOS that allows an application to execute arbitrary code with kernel privileges. It affects macOS syste...
Jun 9, 2020CVE-2020-9837 is an out-of-bounds read vulnerability in Apple operating systems that allows a remote attacker to leak memory, potentially exposing sen...
Jun 9, 2020CVE-2020-9838 is an out-of-bounds read vulnerability in iOS and iPadOS that could allow remote attackers to execute arbitrary code on affected devices...
Jun 9, 2020This CVE describes an integer overflow vulnerability in macOS that allows an application to execute arbitrary code with kernel privileges. It affects ...
Jun 9, 2020This CVE describes a cross-site scripting (XSS) vulnerability in Apple's web content processing across multiple platforms. Attackers can inject malici...
Jun 9, 2020CVE-2020-9815 is an out-of-bounds read vulnerability in Apple's audio file processing that could allow arbitrary code execution when processing a mali...
Jun 9, 2020CVE-2020-9817 is a privilege escalation vulnerability in macOS that allows malicious applications to gain root privileges due to improper permission v...
Jun 9, 2020This CVE describes a logic issue in iOS/iPadOS that allows a remote attacker to modify the file system. The vulnerability affects Apple mobile devices...
Jun 9, 2020This CVE describes a kernel privilege escalation vulnerability in macOS where a malicious application could exploit an out-of-bounds write to execute ...
Jun 9, 2020This macOS vulnerability allows non-privileged users to modify restricted network settings, potentially bypassing security controls. It affects macOS ...
Jun 9, 2020This vulnerability allows a remote attacker to cause a denial of service (DoS) condition on affected Apple devices by sending specially crafted input....
Jun 9, 2020Why Monitor Apple Security Vulnerabilities?
Real-time CVE tracking: Our automated system monitors 1,430+ known vulnerabilities affecting Apple products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.
Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Apple packages in under 60 seconds. No agents required - completely agentless scanning that works across Apple deployments.
Free vulnerability database: Access detailed information about every Apple CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.
🚀 Get Started in 60 Seconds
- Register free account & add your servers
- Run one-time scan or schedule automatic monitoring (every 1-24 hours)
- Receive instant alerts when new Apple CVEs affect your systems
- Access dashboard with severity breakdown & fix instructions