Apple Security Vulnerabilities (CVEs)
Track 1,282 security vulnerabilities affecting Apple products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.
This CVE describes a privacy vulnerability where call history from deleted apps may still appear in Spotlight search results on iOS/iPadOS devices. Th...
May 12, 2025This vulnerability allows attackers with physical access to an iOS/iPadOS device to recover deleted call recordings. The issue stems from improper acc...
May 12, 2025A sandbox escape vulnerability in macOS allows sandboxed applications to bypass security restrictions and access sensitive user data. This affects mac...
May 12, 2025This CVE describes a memory corruption vulnerability in Apple operating systems that could allow an attacker to cause system crashes or corrupt kernel...
May 12, 2025An out-of-bounds read vulnerability in Apple operating systems allows attackers to disclose user information by parsing malicious files. This affects ...
May 12, 2025This vulnerability allows malicious apps to access sensitive user data on Apple devices due to improper state management. It affects users running old...
May 12, 2025This CVE describes a logging vulnerability in Apple's iCloud Keychain where sensitive data (usernames and associated websites) was not properly redact...
May 12, 2025This vulnerability allows malicious web content to cause unexpected process crashes in Apple's Safari browser and operating systems. It affects users ...
May 12, 2025This vulnerability allows applications to observe hostnames of new network connections on macOS systems, potentially exposing sensitive information ab...
May 12, 2025This is a memory corruption vulnerability in Apple operating systems that could allow an attacker to cause system crashes or corrupt kernel memory. It...
May 12, 2025This CVE describes an integer overflow vulnerability in multiple Apple operating systems that could allow a remote attacker to leak memory. The vulner...
May 12, 2025A macOS privilege escalation vulnerability allows malicious applications to gain elevated system privileges through improper input sanitization. This ...
May 12, 2025This vulnerability allows an attacker to enable iCloud folder sharing without proper authentication. It affects multiple Apple operating systems inclu...
May 12, 2025This macOS vulnerability allows malicious applications to escape their sandbox restrictions, potentially accessing system resources or other applicati...
May 12, 2025This is a memory corruption vulnerability in Apple's WebKit browser engine affecting multiple Apple operating systems and Safari. Processing malicious...
May 12, 2025A type confusion vulnerability in Apple's Safari browser and related operating systems could cause unexpected crashes when processing malicious web co...
May 12, 2025This vulnerability allows malicious iOS/iPadOS apps to enumerate which other apps are installed on a user's device. It affects users running iOS/iPadO...
May 12, 2025This is a cross-site request forgery (CSRF) vulnerability in Apple's WebKit browser engine that could allow memory corruption when processing maliciou...
May 12, 2025This CVE describes a permissions escalation vulnerability in macOS that allows an application to gain root privileges. It affects macOS Ventura, Sonom...
May 12, 2025This vulnerability allows attackers to use Siri voice commands on locked iOS/iPadOS devices to enable Auto-Answer Calls, potentially allowing unauthor...
May 12, 2025This CVE describes a memory corruption vulnerability in Apple operating systems that could allow a malicious app to cause a system crash (unexpected t...
May 12, 2025This CVE describes an information disclosure vulnerability in Apple operating systems where an app could leak sensitive kernel state. It affects multi...
May 12, 2025This CVE describes a permissions vulnerability in iOS/iPadOS that allows apps to read persistent device identifiers without proper authorization. This...
May 12, 2025This memory handling vulnerability in Apple's AirPlay and CarPlay SDKs allows attackers on the same local network to cause application crashes through...
Apr 30, 2025This CVE describes an integer overflow vulnerability in multiple Apple operating systems that could allow an attacker on the local network to cause a ...
Apr 29, 2025This CVE describes a null pointer dereference vulnerability in multiple Apple operating systems that was fixed with improved input validation. An atta...
Apr 29, 2025This CVE describes an authentication bypass vulnerability in multiple Apple operating systems where an attacker on the local network can circumvent au...
Apr 29, 2025A use-after-free memory corruption vulnerability in Apple operating systems allows local network attackers to corrupt process memory. This affects mac...
Apr 29, 2025This vulnerability allows an unauthenticated attacker on the same local network to send AirPlay commands to a signed-in Mac without requiring pairing....
Apr 29, 2025This vulnerability allows an attacker on the same local network to cause unexpected application termination (denial of service) on affected Apple devi...
Apr 29, 2025This is a critical memory corruption vulnerability in Apple's media processing that allows remote code execution via malicious audio streams. Attacker...
Apr 16, 2025This CVE describes a use-after-free vulnerability in Apple's WebKit browser engine that could allow arbitrary code execution when processing malicious...
Apr 11, 2025This CVE describes a sandbox escape vulnerability in Apple operating systems where improper path validation allows malicious apps to break out of thei...
Apr 11, 2025This vulnerability in macOS allows processing malicious files to cause denial-of-service or potentially leak memory contents. It affects macOS systems...
Apr 11, 2025This macOS privilege escalation vulnerability allows malicious applications to gain elevated system privileges without proper authorization. It affect...
Apr 11, 2025This vulnerability allows a sandboxed process to bypass sandbox restrictions through a path handling issue. It affects Apple iOS, iPadOS, and macOS us...
Apr 11, 2025A race condition vulnerability in macOS allows applications to bypass Privacy preferences, potentially accessing protected data without user consent. ...
Mar 31, 2025This CVE describes an information disclosure vulnerability in Apple operating systems where an app could access sensitive user data due to improper st...
Mar 31, 2025This vulnerability allows macOS shortcuts to execute with administrative privileges without proper authentication. It affects macOS Ventura, Sequoia, ...
Mar 31, 2025This CVE describes a path handling vulnerability in Apple operating systems that could allow an app to read sensitive location information. The issue ...
Mar 31, 2025A validation logic vulnerability in multiple Apple operating systems allows remote attackers to cause denial-of-service conditions. This affects users...
Mar 31, 2025This vulnerability allows malicious applications to delete files they shouldn't have permission to access by exploiting improper symlink handling. It ...
Mar 31, 2025This vulnerability allows malicious applications to bypass permission checks and gain unauthorized access to the local network on Apple devices. It af...
Mar 31, 2025This vulnerability allows an application to modify protected parts of the macOS file system, potentially bypassing security restrictions. It affects m...
Mar 31, 2025A macOS vulnerability allows malicious applications to access private information due to insufficient access controls. This affects macOS Sequoia befo...
Mar 31, 2025A directory path parsing vulnerability in Apple operating systems allows applications to escalate privileges to root. This affects macOS Ventura, iOS,...
Mar 31, 2025This macOS vulnerability allows malicious applications to create symbolic links to protected disk regions, potentially bypassing security restrictions...
Mar 31, 2025A permissions vulnerability in macOS allows applications to bypass access controls and access protected user data. This affects macOS Ventura, Sequoia...
Mar 31, 2025This CVE describes a macOS sandbox bypass vulnerability where malicious applications can access protected user data from system pasteboards. It affect...
Mar 31, 2025This vulnerability allows malicious apps to bypass data container restrictions and access sensitive user data on Apple devices. It affects iOS, iPadOS...
Mar 31, 2025Why Monitor Apple Security Vulnerabilities?
Real-time CVE tracking: Our automated system monitors 1,282+ known vulnerabilities affecting Apple products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.
Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Apple packages in under 60 seconds. No agents required - completely agentless scanning that works across Apple deployments.
Free vulnerability database: Access detailed information about every Apple CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.
🚀 Get Started in 60 Seconds
- Register free account & add your servers
- Run one-time scan or schedule automatic monitoring (every 1-24 hours)
- Receive instant alerts when new Apple CVEs affect your systems
- Access dashboard with severity breakdown & fix instructions