Filter

Versions

11.0
452
10.15.7
388
10.15
340
10.15.7-security_update_2020-001
310
10.15.7-security_update_2021-001
291
10.15.7-supplemental_update
263
10.15.7-security_update_2021-002
256
12.0
225
10.14.6
224
10.4.2
222
10.14.6-security_update_2020-002
219
10.14.6-security_update_2020-001
218
10.14.6-security_update_2020-003
214
10.4.1
210
10.15.7-security_update_2021-003
209
10.4
209
10.4.3
205
10.4.6
205
10.4.5
202
10.4.4
201
10.14.6-security_update_2020-004
199
10.4.8
196
10.14.6-security_update_2020-005
194
10.14.6-security_update_2020-006
194
10.14.6-security_update_2019-006
186
10.15.7-security_update_2020
186
10.14.6-security_update_2019-007
184
10.4.7
184
10.15.7-security_update_2020-005
182
10.15.7-security_update_2020-007
181
10.14
180
10.14.6-security_update_2019-001
180
10.14.6-security_update_2019-002
179
10.5.1
176
10.4.9
173
10.14.6-security_update_2019-004
172
10.14.6-security_update_2019-005
172
10.6.0
169
10.5
168
10.5.2
168
10.14.6-supplemental_update
167
10.14.6-supplemental_update_2
167
10.4.11
167
10.5.8
164
10.6.1
161
10.4.10
160
10.6.2
158
10.15.7-security_update_2021-006
156
10.5.4
154
10.14.6-security_update_2020-007
153
10.6.3
153
10.5.3
150
10.5.5
142
10.3.9
139
10.5.6
136
10.15.7-security_update_2021-004
134
10.5.0
133
12.0.0
128
10.15.7-security_update_2021-007
127
10.15.6
121
10.15.7-security_update_2021-005
121
10.5.7
121
10.4.0
115
10.10.4
105
10.6.4
105
10.14.6-security_update_2021-001
102
10.15.7-security_update_2022-001
100
10.15.7-security_update_2022-002
99
10.14.6-security_update_2021-002
98
10.15.7-security_update_2021-008
96
10.3
85
10.3.3
85
10.8.0
84
10.14.5
83
10.3.2
83
13.0
83
10.8.1
82
10.8.2
82
10.3.4
81
10.7.0
81
10.3.1
80
10.15.7-security_update_2022-003
77
10.2
75
10.3.5
75
10.2.2
74
10.8.3
74
10.2.8
73
10.8.5
73
10.14.6-security_update_2021-003
71
10.3.6
69
10.8.4
68
10.10.3
67
10.11.0
67
10.3.7
67
10.6.8
67
10.9
67
10.10.5
66
10.6.5
66
10.9.1
65
10.13.0
64
10.3.8
64
10.2.1
62
10.2.3
62
10.0
60
10.12.3
60
10.2.4
60
10.1
59
10.2.6
59
10.14.0
58
10.2.5
58
10.0.2
57
10.0.3
57
10.2.7
57
10.7.1
56
10.0.1
55
10.0.4
55
10.1.5
55
10.1.1
54
10.1.2
54
10.1.3
54
10.1.4
54
10.10.1
51
14.0
50
10.11.1
49
10.9.2
49
10.12.1
47
10.6.6
47
10.7.2
47
10.13.6
46
10.15.6-supplemental_update
46
10.11.3
44
10.9.5
44
10.15.5
43
10.11.4
42
10.11.6
42
10.15.7-security_update_2022-004
42
10.12.6
41
10.7.3
39
10.10.2
38
10.6.7
38
10.9.3
38
10.13.6-security_update_2019-001
37
11.0.1
37
10.0.0
36
10.13.6-security_update_2018-002
36
10.13.6-security_update_2018-003
36
10.13.6-security_update_2019-002
36
10.13.6-security_update_2019-003
35
10.13.6-security_update_2019-004
33
10.13.6-security_update_2019-005
33
10.13.6-security_update_2019-006
33
10.13.6-security_update_2019-007
32
10.9.4
32
10.13.6-security_update_2020-001
31
10.12.4
30
10.11.5
29
10.1.0
28
10.12.5
28
10.13.6-security_update_2020-002
28
10.2.0
28
10.3.0
28
10.7.4
28
10.13
27
10.14.6-security_update_2021-004
26
10.7.5
26
10.6.9
25
10.8.5-supplemental_update
22
10.13.6-security_update_2020-003
21
10.15.2
21
10.15.3
21
10.10.0
20
10.14.3
20
10.15.4
20
10.12
19
10.12.0
19
10.14.1
19
10.15.1
19
10.14.2
16
10.14.4
16
10.14.4-beta4
13
11.1
13
11.6
13
15.0
10
10.11
8
10.11.6-security_update_2016-001
7
10.11.6-security_update_2016-002
7
10.11.6-security_update_2016-003
7
10.11.6-security_update_2017-001
7
10.11.6-security_update_2017-002
7
10.11.6-security_update_2017-003
7
11.0.0
7
10.12.6-security_update_2017-001
6
10.13.6-supplemental_update
6
10.5.2-2008-002
6
10.6
6
10.11.2
5
10.13.6-security_update_2020-004
5
9.0
5
10.12.2
4
10.12.6-security_update_2018-001
4
10.12.6-security_update_2018-002
4
10.12.6-security_update_2019-001
4
14
4
10.11.6-security_update_2017-004
3
10.12.6-security_update_2018-003
3
10.12.6-security_update_2018-004
3
10.12.6-security_update_2018-005
3
10.12.6-security_update_2018-006
3
10.12.6-security_update_2019-002
3
10.15.0
3
10.4.
3
13
3
-
2
10.10
2
10.12.6-security_update_2017-002
2
10.12.6-security_update_2019-003
2
10.7
2
10.8
2
11.2
2
12
2
12.0.1
2
12.1
2
12.3
2
14.1
2
15
2
8.5
2
8.6
2
9
2
1.0
1
10.11.6-security_update_2017-005
1
10.11.6-security_update_2018-001
1
10.11.6-security_update_2018-002
1
10.13.1
1
10.13.3
1
10.6-server
1
10.9.0
1
11.1.0
1
11.2.1
1
11.3
1
11.3.1
1
11.4
1
11.5
1
11.6.0
1
11.7
1
12.4
1
12.6.7
1
13.1
1
13.3.3
1
7.5.3
1
7.6
1
7.6.1
1
8.0
1
8.1
1

The RegisterApple plugs security hole in its iThings that's already been exploited in iOS

First published (updated )

Dark ReadingApple Patches Actively Exploited Zero-Day Vulnerability

First published (updated )

Apple iOS, iPadOS, and watchOSApple Multiple Products Use-After-Free Vulnerability

7.8
EPSS
0.21%
Trending
3 Months
First published (updated )

Apple iOS, iPadOS, and watchOSUse After Free, Input Validation, Null Pointer Dereference, Race Condition

EPSS
0.05%
First published (updated )

Apple macOSRace Condition, Input Validation, Null Pointer Dereference, Use After Free

EPSS
0.04%
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Apple macOSInput Validation, Null Pointer Dereference

3.3
EPSS
0.04%
First published (updated )

Apple iOS, iPadOS, and watchOSInput Validation, Null Pointer Dereference, Use After Free, Race Condition

EPSS
0.05%
First published (updated )

Apple iOS, iPadOS, and watchOSUse After Free, Input Validation, Null Pointer Dereference, Race Condition, Buffer Overflow

First published (updated )

Apple macOS SequoiaUse After Free, Input Validation, Null Pointer Dereference

EPSS
0.05%
First published (updated )

Apple iOS, iPadOS, and watchOSInput Validation, Null Pointer Dereference

EPSS
0.05%
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Apple Mobile SafariRace Condition, Input Validation, Null Pointer Dereference, Use After Free

7.5
EPSS
0.05%
First published (updated )

Apple iOS, iPadOS, and watchOSUse After Free, Input Validation, Null Pointer Dereference, Race Condition

First published (updated )

Apple macOSRace Condition, Use After Free, Input Validation, Null Pointer Dereference

EPSS
0.05%
First published (updated )

Apple iOS, iPadOS, and watchOSUse After Free, Input Validation, Null Pointer Dereference

First published (updated )

Apple iOS, iPadOS, and watchOSInput Validation, Use After Free, Race Condition, Buffer Overflow, Null Pointer Dereference

EPSS
0.06%
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Apple macOSInput Validation, Race Condition, Use After Free, Buffer Overflow, Null Pointer Dereference, Command Injection

7.5
EPSS
0.05%
First published (updated )

Apple iOS, iPadOS, and watchOSInput Validation, Null Pointer Dereference

EPSS
0.05%
First published (updated )

Apple iOS, iPadOS, and watchOSCommand Injection, Input Validation, Null Pointer Dereference, Use After Free, Race Condition, Buffer Overflow

8.8
EPSS
0.06%
First published (updated )

Dark ReadingApple Bug Allows Root Protections Bypass Without Physical Access

First published (updated )

Apple iOS and macOSApple macOS libFontValidation Font Glyph Flags Parsing Out-Of-Bounds Read Information Disclosure Vulnerability

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Apple iOS and macOSApple macOS libFontValidation post Table Parsing Out-Of-Bounds Read Information Disclosure Vulnerability

First published (updated )

Apple iOS and macOSZDI-25-021: Apple macOS libFontValidation Font Glyph Flags Parsing Out-Of-Bounds Read Information Disclosure Vulnerability

First published (updated )

Apple iOS and macOSZDI-25-020: Apple macOS libFontValidation post Table Parsing Out-Of-Bounds Read Information Disclosure Vulnerability

First published (updated )

Apple iOS and macOSApple macOS libFontValidation kern Table Parsing Out-Of-Bounds Read Information Disclosure Vulnerability

First published (updated )

Apple iOS and macOSZDI-25-022: Apple macOS libFontValidation Font Glyph YCoordinate Parsing Out-Of-Bounds Read Information Disclosure Vulnerability

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Apple iOS and macOSApple macOS libFontValidation Font Glyph YCoordinate Parsing Out-Of-Bounds Read Information Disclosure Vulnerability

First published (updated )

Apple iOS and macOSZDI-25-017: Apple macOS libFontValidation kern Table Parsing Out-Of-Bounds Read Information Disclosure Vulnerability

First published (updated )

Apple iOS and macOSApple macOS CoreText Font Ligature Caret List Parsing Out-Of-Bounds Read Information Disclosure Vulnerability

First published (updated )

Apple iOS and macOSZDI-25-016: Apple macOS CoreText Font Ligature Caret List Parsing Out-Of-Bounds Read Information Disclosure Vulnerability

First published (updated )

Apple iOS and macOSApple macOS libFontValidation loca Table Parsing Out-Of-Bounds Read Information Disclosure Vulnerability

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203