Apple Security Vulnerabilities (CVEs)
Track 1,282 security vulnerabilities affecting Apple products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.
This CVE describes memory corruption vulnerabilities in Apple's graphics processing that could allow arbitrary code execution. Attackers can exploit t...
Jul 30, 2025This critical vulnerability in macOS allows an application to write data beyond allocated memory boundaries, potentially leading to system crashes or ...
Jul 30, 2025This CVE describes a logic flaw in macOS and Safari where a download's origin may be incorrectly associated, potentially allowing malicious downloads ...
Jul 30, 2025This vulnerability allows malicious applications to bypass symlink validation and access protected user data on Apple devices. It affects users runnin...
Jul 30, 2025A use-after-free vulnerability (CWE-416) in Apple operating systems allows attackers to cause unexpected application termination. This affects macOS a...
Jul 30, 2025An out-of-bounds memory access vulnerability in Apple's media processing components allows attackers to cause denial of service or potentially execute...
Jul 30, 2025This vulnerability allows an attacker to read memory outside the intended buffer when processing a malicious image. It affects Apple devices running v...
Jul 30, 2025This vulnerability in Apple's WebKit browser engine allows malicious web content to bypass security controls and access sensitive user information. It...
Jul 30, 2025This is a critical out-of-bounds memory access vulnerability in Apple's Safari browser across multiple Apple operating systems. Processing malicious w...
Jul 30, 2025A memory handling vulnerability in Apple WebKit (CWE-119) allows malicious web content to cause Safari to crash unexpectedly. This affects users of Sa...
Jul 30, 2025This CVE describes a memory handling vulnerability in Apple's Safari browser and related WebKit components across multiple Apple operating systems. Pr...
Jul 30, 2025A use-after-free vulnerability in Apple's Safari browser and related WebKit components allows attackers to cause unexpected crashes by processing mali...
Jul 30, 2025This vulnerability allows attackers to read memory contents outside the intended buffer when processing malicious USD (Universal Scene Description) fi...
Jul 30, 2025This CVE describes a configuration bypass vulnerability in macOS that allows account-driven User Enrollment even when Lockdown Mode is enabled. This a...
Jul 30, 2025This CVE describes a macOS vulnerability where an application can bypass file system protections and modify restricted areas. It affects macOS Ventura...
Jul 30, 2025This CVE describes a path handling vulnerability in macOS that allows an application to gain root privileges through improper validation. It affects m...
Jul 30, 2025This vulnerability allows malicious applications to bypass macOS security protections and access sensitive user data they shouldn't have permission to...
Jul 30, 2025A path validation vulnerability in macOS allows applications to bypass directory restrictions and access protected user data. This affects macOS Ventu...
Jul 30, 2025This CVE describes a permissions issue in Apple operating systems that allows applications to fingerprint users. The vulnerability affects macOS, iPad...
Jul 30, 2025This CVE describes an input validation vulnerability in Apple operating systems that allows maliciously crafted files to cause unexpected app terminat...
Jul 30, 2025This CVE describes a code-signing downgrade vulnerability in macOS that could allow malicious applications to bypass security restrictions and access ...
Jul 30, 2025This is a critical memory corruption vulnerability in Apple's file parsing components across multiple operating systems. Exploitation could allow arbi...
Jul 30, 2025This vulnerability allows malicious applications to read kernel memory on macOS systems, potentially exposing sensitive system information. It affects...
Jul 30, 2025This CVE describes a logic flaw in Safari that could be exploited by malicious web content to cause unexpected crashes. The vulnerability affects Safa...
Jul 30, 2025This vulnerability allows a remote attacker to cause unexpected system termination (crash/reboot) on affected Apple devices. It affects multiple Apple...
Jul 30, 2025This vulnerability allows VoiceOver, Apple's screen reader accessibility feature, to audibly read device passcodes when enabled. This affects iOS and ...
Jul 30, 2025This memory corruption vulnerability in Apple's WebKit browser engine allows attackers to execute arbitrary code by tricking users into visiting malic...
Jul 30, 2025This vulnerability allows remote content to be loaded in Apple's Mail app even when the 'Load Remote Images' privacy setting is disabled. It affects i...
Jul 30, 2025This is a memory corruption vulnerability in Apple's WebKit browser engine affecting multiple Apple operating systems. Processing malicious web conten...
Jul 30, 2025This vulnerability in Google Chrome's ANGLE and GPU components allows insufficient input validation, enabling a remote attacker to potentially escape ...
Jul 15, 2025A permissions vulnerability in macOS allows applications to access sensitive location information without proper authorization. This affects macOS sys...
May 29, 2025This memory corruption vulnerability in macOS allows malicious applications to corrupt coprocessor memory, potentially leading to arbitrary code execu...
May 29, 2025This vulnerability allows malicious websites to bypass the Same Origin Policy in Apple's Safari browser and related WebKit-based browsers. This could ...
May 29, 2025This CVE describes a path handling vulnerability in macOS that allows improper symlink validation. Attackers could potentially exploit this to access ...
May 29, 2025This CVE describes a permissions vulnerability in Apple operating systems that allows applications to modify protected areas of the file system. The i...
May 19, 2025A memory handling vulnerability in Apple operating systems allows an app to cause unexpected system termination (crash/reboot). This affects users of ...
May 19, 2025This memory corruption vulnerability in Apple's WebKit browser engine allows attackers to execute arbitrary code by tricking users into visiting malic...
May 19, 2025This vulnerability allows processing a maliciously crafted media file to cause unexpected app termination or corrupt process memory. It affects Apple ...
May 12, 2025This vulnerability in iOS/iPadOS FaceTime allows audio to continue transmitting even when the microphone is muted during calls. This affects users of ...
May 12, 2025This CVE describes a memory handling vulnerability in Apple's WebKit browser engine that could cause Safari to crash when processing malicious web con...
May 12, 2025This CVE describes a privilege escalation vulnerability in macOS where improper input sanitization allows an application to gain elevated privileges. ...
May 12, 2025This CVE describes an information disclosure vulnerability in macOS where applications could access sensitive user data without proper authorization. ...
May 12, 2025A vulnerability in macOS AFP (Apple Filing Protocol) allows attackers to cause system termination (kernel panic/crash) by mounting a maliciously craft...
May 12, 2025A use-after-free vulnerability in Apple operating systems allows parsing malicious files to cause unexpected application termination. This affects use...
May 12, 2025A vulnerability in macOS AFP network share mounting allows attackers to cause system termination (kernel panic) by tricking users into connecting to m...
May 12, 2025This CVE describes a privacy vulnerability in Apple operating systems where applications could access sensitive user data from log entries. The issue ...
May 12, 2025This CVE describes a file quarantine bypass vulnerability in macOS that allows applications to escape their sandbox restrictions. The vulnerability af...
May 12, 2025This vulnerability in macOS AFP (Apple Filing Protocol) allows a malicious AFP server to corrupt kernel memory when a vulnerable macOS system connects...
May 12, 2025This CVE describes a logic flaw in macOS that could allow malicious applications to access sensitive user data without proper authorization. The vulne...
May 12, 2025This memory corruption vulnerability in Apple's WebKit browser engine allows attackers to execute arbitrary code by tricking users into visiting malic...
May 12, 2025Why Monitor Apple Security Vulnerabilities?
Real-time CVE tracking: Our automated system monitors 1,282+ known vulnerabilities affecting Apple products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.
Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Apple packages in under 60 seconds. No agents required - completely agentless scanning that works across Apple deployments.
Free vulnerability database: Access detailed information about every Apple CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.
🚀 Get Started in 60 Seconds
- Register free account & add your servers
- Run one-time scan or schedule automatic monitoring (every 1-24 hours)
- Receive instant alerts when new Apple CVEs affect your systems
- Access dashboard with severity breakdown & fix instructions