Filter
AND

Versions

11.0
149
10.15.7
123
10.15
109
10.4.2
102
10.15.7-security_update_2020-001
97
10.4
96
10.4.1
96
10.15.7-security_update_2021-001
95
10.4.3
94
10.4.4
92
10.4.5
92
10.4.6
92
10.6.0
92
10.4.8
90
10.6.1
90
10.6.2
86
10.15.7-security_update_2021-002
83
10.4.7
83
10.6.3
82
10.5.1
80
12.0
77
10.15.7-supplemental_update
74
10.4.10
74
10.5.2
74
10.4.11
72
10.4.9
72
10.5.8
69
10.3.9
68
10.14.6
67
10.14.6-security_update_2020-001
67
10.5
67
10.14.6-security_update_2020-002
66
10.14.6-security_update_2020-003
66
10.15.7-security_update_2020
64
10.5.3
64
10.5.4
64
10.14.6-security_update_2019-006
63
10.14.6-security_update_2019-001
61
10.14.6-security_update_2019-002
61
10.14.6-security_update_2019-007
61
10.15.7-security_update_2021-003
60
10.5.5
60
10.6.4
60
10.5.6
59
10.14.6-security_update_2019-004
58
10.14.6-security_update_2019-005
58
10.5.0
58
10.14.6-security_update_2020-004
57
10.15.7-security_update_2020-005
57
10.15.7-security_update_2020-007
57
10.14.6-security_update_2020-005
56
10.14.6-security_update_2020-006
56
10.8.2
56
10.8.0
55
10.8.1
55
10.10.4
54
10.14
50
10.5.7
50
10.15.7-security_update_2021-006
48
10.8.3
48
10.14.6-supplemental_update
47
10.14.6-supplemental_update_2
47
10.3
47
10.4.0
47
10.3.2
46
10.7.0
46
10.8.5
46
10.11.0
45
10.3.3
45
10.3.1
44
10.8.4
44
10.7.1
43
10.3.4
42
10.14.6-security_update_2020-007
41
10.15.7-security_update_2021-007
41
12.0.0
41
10.10.3
40
10.3.5
40
10.15.6
39
10.15.7-security_update_2021-004
39
10.6.5
39
10.15.7-security_update_2021-005
37
10.2.2
37
10.3.6
37
10.2
36
10.2.8
36
10.3.7
36
10.3.8
36
10.6.6
36
10.7.2
35
13.0
35
10.9
34
10.6.8
33
10.9.1
33
10.2.1
32
10.2.3
32
10.2.4
32
10.2.5
32
10.2.6
32
10.11.1
31
10.14.6-security_update_2021-001
31
10.15.7-security_update_2022-001
31
10.15.7-security_update_2022-002
31
10.2.7
31
10.7.3
31
10.14.6-security_update_2021-002
30
10.15.7-security_update_2021-008
29
10.0
28
10.1
28
14.0
28
10.1.5
27
10.6.7
27
10.0.1
26
10.0.2
26
10.0.3
26
10.0.4
26
10.1.1
26
10.1.2
26
10.1.3
26
10.1.4
26
10.10.5
26
10.13.0
26
10.14.5
26
10.9.2
26
10.9.5
26
10.10.2
24
10.14.6-security_update_2021-003
24
10.9.4
23
10.14.0
22
10.15.7-security_update_2022-003
22
10.7.4
22
10.7.5
21
10.0.0
20
10.1.0
19
10.2.0
19
10.3.0
19
10.9.3
18
10.10.1
17
10.13.6
16
10.13.6-security_update_2019-001
16
10.11.6
15
10.13.6-security_update_2018-002
15
10.13.6-security_update_2018-003
15
10.13.6-security_update_2019-002
15
10.13.6-security_update_2019-003
15
11.0.1
15
10.12.1
14
10.15.5
14
10.15.6-supplemental_update
14
10.11.3
13
10.13.6-security_update_2019-004
13
10.13.6-security_update_2019-005
13
10.13.6-security_update_2019-006
13
10.13.6-security_update_2019-007
13
10.15.7-security_update_2022-004
13
10.8.5-supplemental_update
13
10.12.6
12
10.13.6-security_update_2020-001
12
10.13.6-security_update_2020-002
10
15.0
10
10.12.3
9
10.13
9
10.13.6-security_update_2020-003
9
10.10.0
7
10.11.4
7
10.12.4
7
10.15.3
7
10.11.5
6
10.14.6-security_update_2021-004
6
10.15.2
6
10.15.4
6
11.6
6
10.15.1
5
10.12.0
4
10.12.5
4
10.14.3
4
10.6
4
10.6.9
4
10.12.6-security_update_2019-001
3
10.13.6-supplemental_update
3
10.14.1
3
10.14.2
3
10.14.4
3
10.14.4-beta4
3
11.0.0
3
9.0
3
-
2
10.12
2
10.12.2
2
10.12.6-security_update_2017-001
2
10.12.6-security_update_2018-001
2
10.12.6-security_update_2018-002
2
10.12.6-security_update_2018-003
2
10.12.6-security_update_2018-004
2
10.12.6-security_update_2018-005
2
10.12.6-security_update_2018-006
2
10.12.6-security_update_2019-002
2
10.12.6-security_update_2019-003
2
10.5.2-2008-002
2
11.1
2
11.2
2
8.5
2
8.6
2
9
2
1.0
1
10.11
1
10.11.2
1
10.11.6-security_update_2016-001
1
10.11.6-security_update_2016-002
1
10.11.6-security_update_2016-003
1
10.11.6-security_update_2017-001
1
10.11.6-security_update_2017-002
1
10.11.6-security_update_2017-003
1
10.12.6-security_update_2017-002
1
10.13.6-security_update_2020-004
1
10.15.0
1
10.4.
1
10.6-server
1
11.1.0
1
11.2.1
1
11.3
1
11.3.1
1
11.4
1
11.5
1
12.0.1
1
12.6.7
1
13
1
13.1
1
13.3.3
1
14
1
7.5.3
1
7.6
1
7.6.1
1
8.0
1
8.1
1

Apple iOS, iPadOS, and watchOSUse After Free, Input Validation, Null Pointer Dereference, Race Condition

EPSS
0.05%
First published (updated )

Apple macOSRace Condition, Input Validation, Null Pointer Dereference, Use After Free

EPSS
0.04%
First published (updated )

Apple iOS, iPadOS, and watchOSInput Validation, Null Pointer Dereference, Use After Free, Race Condition

EPSS
0.05%
First published (updated )

Apple macOS SequoiaUse After Free, Input Validation, Null Pointer Dereference

EPSS
0.05%
First published (updated )

Apple iOS, iPadOS, and watchOSInput Validation, Null Pointer Dereference

EPSS
0.05%
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Apple iOS, iPadOS, and watchOSUse After Free, Input Validation, Null Pointer Dereference, Race Condition

First published (updated )

Apple macOSRace Condition, Use After Free, Input Validation, Null Pointer Dereference

EPSS
0.05%
First published (updated )

Apple iOS, iPadOS, and watchOSInput Validation, Use After Free, Race Condition, Buffer Overflow, Null Pointer Dereference

EPSS
0.06%
First published (updated )

Apple iOS, iPadOS, and watchOSInput Validation, Null Pointer Dereference

EPSS
0.05%
First published (updated )

Adobe Acrobat ReaderAcrobat Reader | NULL Pointer Dereference (CWE-476)

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Adobe Acrobat ReaderAcrobat Reader | Out-of-bounds Read (CWE-125)

First published (updated )

Adobe Acrobat ReaderAcrobat Reader | Use After Free (CWE-416)

First published (updated )

Adobe Acrobat ReaderAcrobat Reader | Out-of-bounds Read (CWE-125)

First published (updated )

Adobe Acrobat ReaderAcrobat Reader | Out-of-bounds Read (CWE-125)

First published (updated )

Apple iOS, iPadOS, and watchOSUse After Free, Race Condition, Input Validation

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Apple iOS, iPadOS, and watchOSUse After Free, Input Validation

First published (updated )

Apple iOS, iPadOS, and watchOSInput Validation

First published (updated )

Apple iOS, iPadOS, and watchOSInput Validation

First published (updated )

Apple iOS, iPadOS, and watchOSUse After Free, Race Condition, Input Validation

First published (updated )

Apple iOS, iPadOS, and watchOSAPFS. This issue was addressed through improved state management.

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Adobe InDesignInDesign Desktop | Out-of-bounds Read (CWE-125)

First published (updated )

Adobe InDesignInDesign Desktop | Out-of-bounds Read (CWE-125)

First published (updated )

Adobe InDesignInDesign Desktop | Out-of-bounds Read (CWE-125)

First published (updated )

Adobe Acrobat ReaderAcrobat Reader | NULL Pointer Dereference (CWE-476)

First published (updated )

Adobe Acrobat ReaderAcrobat Reader | Improper Restriction of XML External Entity Reference ('XXE') (CWE-611)

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Apple iOS, iPadOS, and watchOSApple Multiple Products Cross-Site Scripting (XSS) Vulnerability

First published (updated )

Apple iOS, iPadOS, and watchOSUse After Free, Input Validation, Race Condition, Buffer Overflow

First published (updated )

Apple iOS, iPadOS, and watchOSInput Validation, Use After Free, Race Condition

First published (updated )

Apple iOS, iPadOS, and watchOSInput Validation, Use After Free, Race Condition, Buffer Overflow

First published (updated )

Apple iOS, iPadOS, and watchOSARKit. The issue was addressed with improved checks.

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203