Apple Security Vulnerabilities (CVEs)
Track 1,277 security vulnerabilities affecting Apple products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.
This CVE describes a race condition vulnerability in Apple's web content processing that could allow an attacker to cause unexpected process crashes. ...
Dec 17, 2025This macOS vulnerability allows applications to bypass security protections and access sensitive user data they shouldn't normally have permission to ...
Dec 17, 2025A buffer overflow vulnerability in Apple's Safari browser and related operating systems allows attackers to cause unexpected process crashes by tricki...
Dec 17, 2025A logging vulnerability in iOS/iPadOS allowed applications to access sensitive user data through insufficient data redaction in system logs. This affe...
Dec 17, 2025This CVE describes an authentication bypass vulnerability in Apple's Photos app where unauthorized users can view photos in the Hidden Photos Album wi...
Dec 17, 2025A logic flaw in macOS file handling allows applications to bypass intended access restrictions and read protected user data. This affects macOS system...
Dec 12, 2025A code-signing downgrade vulnerability in Intel-based Mac computers allows malicious apps to bypass security restrictions and access sensitive user da...
Dec 12, 2025A macOS permissions vulnerability allows applications to access sensitive user data they shouldn't have permission to view. This affects macOS systems...
Dec 12, 2025A permissions vulnerability in macOS allows applications to gain root privileges through improper access restrictions. This affects macOS Tahoe and Se...
Dec 12, 2025This vulnerability allows an app to access sensitive user data on Apple devices due to insufficient access controls. It affects macOS, iOS, and iPadOS...
Dec 12, 2025This CVE describes a memory corruption vulnerability in Apple operating systems caused by improper bounds checking. Processing malicious data could ca...
Dec 12, 2025This CVE describes a logging data exposure vulnerability in Apple operating systems where applications could access sensitive user data through insuff...
Dec 12, 2025A memory corruption vulnerability in Apple operating systems allows attackers to execute arbitrary code by processing a malicious file. This affects u...
Dec 12, 2025A FaceTime remote control vulnerability allows password fields to be unintentionally revealed during screen sharing sessions. This affects users of Ap...
Dec 12, 2025This CVE describes an information disclosure vulnerability in Apple operating systems where malicious applications could potentially access sensitive ...
Dec 12, 2025An integer overflow vulnerability in Apple operating systems could allow malicious applications to gain root privileges. This affects multiple Apple p...
Dec 12, 2025This CVE describes a FaceTime caller ID spoofing vulnerability in Apple operating systems. An attacker can manipulate the caller ID displayed during F...
Dec 12, 2025This CVE describes a use-after-free vulnerability in Apple's WebKit browser engine that affects multiple Apple operating systems and Safari. Processin...
Dec 12, 2025A privilege escalation vulnerability in Apple operating systems allows malicious applications to gain elevated privileges. This affects macOS, iOS, an...
Dec 12, 2025A permissions vulnerability in macOS allows applications to access sensitive location information without proper authorization. This affects macOS Tah...
Dec 12, 2025A session management vulnerability in macOS Voice Control allows users with Voice Control enabled to potentially transcribe another user's activity. T...
Dec 12, 2025This CVE describes a macOS privacy vulnerability where applications could access protected user data through insufficient log redaction. It affects ma...
Dec 12, 2025This CVE describes a logic flaw in Apple's spellcheck API that could allow malicious applications to access files they shouldn't have permission to vi...
Dec 12, 2025A permissions vulnerability in macOS allows applications to bypass intended restrictions and access sensitive user data. This affects users running ma...
Dec 12, 2025This CVE describes a memory corruption vulnerability in Apple operating systems that could allow a malicious application to cause system crashes or wr...
Dec 12, 2025A code-signing downgrade vulnerability in Intel-based Mac computers allows malicious apps to bypass security restrictions and access sensitive user da...
Dec 12, 2025This CVE describes a permissions bypass vulnerability in macOS where a standard user can view files from a disk image belonging to an administrator. T...
Dec 12, 2025This macOS vulnerability allows malicious applications to bypass security checks and access sensitive user data. It affects macOS systems running vers...
Dec 12, 2025A macOS vulnerability allows applications to access sensitive user data due to improper state management. This affects macOS Tahoe versions before 26....
Dec 12, 2025This CVE describes an input validation vulnerability in macOS that allows an app to cause denial-of-service conditions. The issue affects macOS Tahoe,...
Dec 12, 2025A mail header parsing vulnerability in Apple operating systems allows attackers to cause persistent denial-of-service conditions. This affects users o...
Dec 12, 2025This CVE describes a sandbox escape vulnerability in macOS where an application can bypass its security restrictions. It affects macOS systems running...
Dec 12, 2025A logic error in macOS iCloud Private Relay prevents activation when multiple users are logged in simultaneously, potentially exposing network traffic...
Dec 12, 2025This macOS vulnerability allows applications to access sensitive user data they shouldn't have permission to view. It affects macOS users running vuln...
Dec 12, 2025This CVE describes a memory corruption vulnerability in Apple operating systems that could allow a malicious application to manipulate shared memory b...
Dec 12, 2025This CVE describes a logic flaw in macOS that could allow malicious applications to access sensitive user data they shouldn't normally be able to reac...
Dec 12, 2025This vulnerability allows an attacker with physical access to a Mac to view deleted notes due to improper cache handling. It affects macOS users runni...
Dec 12, 2025A logic vulnerability in macOS allows applications to bypass access restrictions and read protected user data. This affects macOS Tahoe, Sequoia, and ...
Dec 12, 2025This CVE describes an information disclosure vulnerability in iOS/iPadOS that allows apps to fingerprint users, potentially revealing unique device or...
Dec 12, 2025This CVE describes a macOS vulnerability where improper symlink validation could allow an application to bypass file system protections and access sen...
Dec 12, 2025A path validation vulnerability in macOS allows applications to bypass directory restrictions and access sensitive user data. This affects macOS Sonom...
Dec 12, 2025This CVE describes a denial-of-service vulnerability in macOS where visiting a malicious website could cause application crashes. The issue was caused...
Dec 12, 2025A path validation vulnerability in macOS allows applications to access sensitive user data through improper directory path parsing. This affects macOS...
Dec 12, 2025This CVE describes an injection vulnerability in macOS that allows malicious applications to access sensitive user data. The issue affects macOS syste...
Dec 12, 2025This vulnerability in macOS allows malicious applications to escalate privileges and gain root access. It affects macOS systems running versions befor...
Dec 12, 2025This macOS vulnerability allows malicious applications to bypass launch constraint protections and execute code with elevated privileges. It affects m...
Dec 12, 2025A permissions vulnerability in macOS allows applications to bypass intended restrictions and access protected user data. This affects macOS Tahoe vers...
Dec 12, 2025This CVE describes a macOS vulnerability where improper symlink handling allows malicious applications to delete protected user data. It affects macOS...
Dec 12, 2025This CVE describes an injection vulnerability in macOS that allows malicious applications to access sensitive user data. The issue affects macOS syste...
Dec 12, 2025A sandbox escape vulnerability in macOS allows malicious applications to bypass security restrictions and access system resources or other application...
Dec 12, 2025Why Monitor Apple Security Vulnerabilities?
Real-time CVE tracking: Our automated system monitors 1,277+ known vulnerabilities affecting Apple products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.
Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Apple packages in under 60 seconds. No agents required - completely agentless scanning that works across Apple deployments.
Free vulnerability database: Access detailed information about every Apple CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.
🚀 Get Started in 60 Seconds
- Register free account & add your servers
- Run one-time scan or schedule automatic monitoring (every 1-24 hours)
- Receive instant alerts when new Apple CVEs affect your systems
- Access dashboard with severity breakdown & fix instructions