Apple Security Vulnerabilities (CVEs)

Track 1,277 security vulnerabilities affecting Apple products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.

159 Critical
677 High
412 Medium
29 Low
🔔 Get Alerts for Apple
CVE-2025-43402 7.8

This memory corruption vulnerability in macOS allows malicious applications to cause system crashes or corrupt process memory. It affects macOS system...

Dec 12, 2025
CVE-2025-43404 3.3

A sandbox escape vulnerability in macOS allows malicious applications to bypass intended restrictions and access sensitive user data. This affects mac...

Dec 12, 2025
CVE-2025-14174 8.8

This vulnerability allows remote attackers to perform out-of-bounds memory access in ANGLE (Almost Native Graphics Layer Engine) in Google Chrome on m...

Dec 12, 2025
CVE-2025-31248 5.5

A path validation vulnerability in macOS allows applications to bypass directory restrictions and access sensitive user data. This affects macOS Ventu...

Nov 21, 2025
CVE-2025-43374 4.3

This vulnerability allows an attacker in physical proximity to cause an out-of-bounds read in kernel memory on Apple devices. It affects multiple Appl...

Nov 21, 2025
CVE-2025-43515 8.8

CVE-2025-43515 is a critical vulnerability in Apple Compressor where unauthenticated attackers on the same network can execute arbitrary code on Compr...

Nov 13, 2025
CVE-2025-43205 4.0

This CVE describes an out-of-bounds memory access vulnerability in Apple operating systems that could allow an app to bypass Address Space Layout Rand...

Nov 12, 2025
CVE-2023-43000 8.8

A use-after-free vulnerability in Apple's WebKit browser engine allows memory corruption when processing malicious web content. This affects users of ...

Nov 5, 2025
CVE-2025-43500 7.5

This CVE describes a privacy vulnerability in Apple operating systems where applications could bypass user preference controls to access sensitive use...

Nov 4, 2025
CVE-2025-43502 7.5

This CVE describes a privacy bypass vulnerability in Apple operating systems where applications can circumvent certain privacy preferences, potentiall...

Nov 4, 2025
CVE-2025-43503 4.3

This CVE describes a user interface spoofing vulnerability in Apple operating systems and Safari browser. Visiting a malicious website could allow att...

Nov 4, 2025
CVE-2025-43504 4.9

A buffer overflow vulnerability in Xcode allows attackers in privileged network positions to cause denial-of-service conditions. This affects develope...

Nov 4, 2025
CVE-2025-43505 8.8

CVE-2025-43505 is an out-of-bounds write vulnerability in Xcode that could allow heap corruption when processing malicious files. This affects develop...

Nov 4, 2025
CVE-2025-43507 6.5

This CVE describes a privacy vulnerability in Apple operating systems where applications could fingerprint users by accessing sensitive data. The issu...

Nov 4, 2025
CVE-2025-43481 5.2

This macOS vulnerability allows malicious applications to escape their security sandbox, potentially accessing system resources or other applications'...

Nov 4, 2025
CVE-2025-43493 4.3

This CVE describes an address bar spoofing vulnerability in Apple web browsers. Visiting a malicious website could allow attackers to display a fake U...

Nov 4, 2025
CVE-2025-43495 5.4

This vulnerability allows malicious iOS/iPadOS apps to monitor keystrokes without user permission, potentially capturing sensitive input like password...

Nov 4, 2025
CVE-2025-43496 7.5

This vulnerability allows remote content to be loaded even when the 'Load Remote Images' setting is disabled in affected Apple operating systems. This...

Nov 4, 2025
CVE-2025-43498 5.5

This CVE describes an authorization vulnerability in Apple operating systems where improper state management could allow an application to access sens...

Nov 4, 2025
CVE-2025-43499 5.5

This vulnerability allows malicious apps to bypass entitlement checks and access sensitive user data on Apple devices. It affects iOS, iPadOS, and mac...

Nov 4, 2025
CVE-2025-43405 7.5

A sandbox escape vulnerability in macOS allows malicious applications to bypass intended restrictions and access sensitive user data. This affects mac...

Nov 4, 2025
CVE-2025-43407 7.8

This vulnerability allows an application to escape its sandbox restrictions on affected Apple operating systems. It affects users running vulnerable v...

Nov 4, 2025
CVE-2025-43408 2.4

This vulnerability allows attackers with physical access to a locked macOS device to access contacts from the lock screen. It affects macOS users runn...

Nov 4, 2025
CVE-2025-43409 5.5

A sandbox escape vulnerability in macOS allows malicious applications to bypass intended restrictions and access sensitive user data. This affects mac...

Nov 4, 2025
CVE-2025-43411 5.5

This CVE describes an information disclosure vulnerability in macOS where applications could access sensitive user data due to insufficient entitlemen...

Nov 4, 2025
CVE-2025-43412 6.3

A sandbox escape vulnerability in macOS allows malicious applications to bypass file quarantine restrictions and potentially access system resources o...

Nov 4, 2025
CVE-2025-43413 7.5

This vulnerability allows sandboxed applications on Apple operating systems to observe system-wide network connections, potentially exposing sensitive...

Nov 4, 2025
CVE-2025-43414 6.2

This CVE describes a permissions bypass vulnerability in macOS Shortcuts that allows shortcuts to access files normally restricted from the Shortcuts ...

Nov 4, 2025
CVE-2025-43392 4.3

This vulnerability allows malicious websites to bypass same-origin policy protections and exfiltrate image data from other websites. It affects users ...

Nov 4, 2025
CVE-2025-43394 5.5

A symlink handling vulnerability in macOS allows applications to bypass file system protections and access sensitive user data. This affects macOS Seq...

Nov 4, 2025
CVE-2025-43395 3.3

This macOS vulnerability allows malicious applications to bypass symlink protections and access protected user data. It affects macOS systems before s...

Nov 4, 2025
CVE-2025-43396 5.5

A sandbox escape vulnerability in macOS allows sandboxed applications to bypass security restrictions and access sensitive user data. This affects mac...

Nov 4, 2025
CVE-2025-43397 5.5

A permissions issue in macOS allows applications to cause denial-of-service conditions. This affects macOS Sequoia, Tahoe, and Sonoma systems before s...

Nov 4, 2025
CVE-2025-43398 5.5

This memory handling vulnerability in Apple operating systems allows applications to cause unexpected system termination (kernel panic/crash). All use...

Nov 4, 2025
CVE-2025-43399 7.5

This vulnerability allows malicious apps to bypass privacy protections and access sensitive user data that should be restricted. It affects iOS, iPadO...

Nov 4, 2025
CVE-2025-43401 7.5

This CVE describes a denial-of-service vulnerability in macOS that was addressed through improved input validation. Remote attackers could potentially...

Nov 4, 2025
CVE-2025-43379 5.5

This CVE describes a symlink validation vulnerability in Apple operating systems that could allow malicious apps to bypass file system protections and...

Nov 4, 2025
CVE-2025-43380 5.5

This CVE describes an out-of-bounds write vulnerability in macOS file parsing that could allow an attacker to cause unexpected application termination...

Nov 4, 2025
CVE-2025-43382 5.5

A path validation vulnerability in macOS allows applications to bypass directory restrictions and access sensitive user data. This affects macOS Sequo...

Nov 4, 2025
CVE-2025-43383 4.3

This CVE describes an out-of-bounds memory access vulnerability in Apple's media file processing. Attackers can craft malicious media files that cause...

Nov 4, 2025
CVE-2025-43384 4.3

This CVE describes an out-of-bounds memory access vulnerability in Apple's media file processing. Attackers can craft malicious media files that cause...

Nov 4, 2025
CVE-2025-43385 4.3

This CVE describes an out-of-bounds memory access vulnerability in Apple's media file processing components. Attackers can craft malicious media files...

Nov 4, 2025
CVE-2025-43386 7.8

An out-of-bounds memory access vulnerability in Apple's media file processing allows malicious media files to cause application crashes or memory corr...

Nov 4, 2025
CVE-2025-43387 7.8

A permissions vulnerability in macOS allows malicious applications to escalate privileges to root access. This affects macOS systems running versions ...

Nov 4, 2025
CVE-2025-43389 5.5

This CVE describes a privacy vulnerability in Apple operating systems where an application could access sensitive user data without proper authorizati...

Nov 4, 2025
CVE-2025-43390 5.5

A code-signing downgrade vulnerability in Intel-based Mac computers allows malicious apps to bypass security restrictions and access sensitive user da...

Nov 4, 2025
CVE-2025-43391 5.5

This CVE describes a privacy vulnerability in Apple operating systems where applications could access sensitive user data through improper handling of...

Nov 4, 2025
CVE-2025-43365 2.8

An unprivileged process can terminate root processes on iOS and iPadOS devices due to improper input validation, causing denial-of-service. This affec...

Nov 4, 2025
CVE-2025-43373 7.5

This CVE describes a memory corruption vulnerability in macOS kernel that could allow a malicious application to cause system crashes or corrupt kerne...

Nov 4, 2025
CVE-2025-43376 7.5

This vulnerability allows remote attackers to view leaked DNS queries when Apple's Private Relay feature is enabled. It affects users of Safari, iOS, ...

Nov 4, 2025

Why Monitor Apple Security Vulnerabilities?

Real-time CVE tracking: Our automated system monitors 1,277+ known vulnerabilities affecting Apple products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.

Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Apple packages in under 60 seconds. No agents required - completely agentless scanning that works across Apple deployments.

Free vulnerability database: Access detailed information about every Apple CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.

🚀 Get Started in 60 Seconds

  • Register free account & add your servers
  • Run one-time scan or schedule automatic monitoring (every 1-24 hours)
  • Receive instant alerts when new Apple CVEs affect your systems
  • Access dashboard with severity breakdown & fix instructions
Start Monitoring Apple CVEs Free