Filter
AND

Versions

11.0
149
10.15.7
123
10.15
109
10.4.2
102
10.15.7-security_update_2020-001
97
10.4
96
10.4.1
96
10.15.7-security_update_2021-001
95
10.4.3
94
10.4.4
92
10.4.5
92
10.4.6
92
10.6.0
92
10.4.8
90
10.6.1
90
10.6.2
86
10.15.7-security_update_2021-002
83
10.4.7
83
10.6.3
82
10.5.1
80
12.0
78
10.15.7-supplemental_update
74
10.4.10
74
10.5.2
74
10.4.11
72
10.4.9
72
10.5.8
69
10.3.9
68
10.14.6
67
10.14.6-security_update_2020-001
67
10.5
67
10.14.6-security_update_2020-002
66
10.14.6-security_update_2020-003
66
10.15.7-security_update_2020
64
10.5.3
64
10.5.4
64
10.14.6-security_update_2019-006
63
10.14.6-security_update_2019-001
61
10.14.6-security_update_2019-002
61
10.14.6-security_update_2019-007
61
10.15.7-security_update_2021-003
60
10.5.5
60
10.6.4
60
10.5.6
59
10.14.6-security_update_2019-004
58
10.14.6-security_update_2019-005
58
10.5.0
58
10.14.6-security_update_2020-004
57
10.15.7-security_update_2020-005
57
10.15.7-security_update_2020-007
57
10.14.6-security_update_2020-005
56
10.14.6-security_update_2020-006
56
10.8.2
56
10.8.0
55
10.8.1
55
10.10.4
54
10.14
50
10.5.7
50
10.15.7-security_update_2021-006
48
10.8.3
48
10.14.6-supplemental_update
47
10.14.6-supplemental_update_2
47
10.3
47
10.4.0
47
10.3.2
46
10.7.0
46
10.8.5
46
10.11.0
45
10.3.3
45
10.3.1
44
10.8.4
44
10.7.1
43
10.3.4
42
10.14.6-security_update_2020-007
41
10.15.7-security_update_2021-007
41
12.0.0
41
10.10.3
40
10.3.5
40
13.0
40
10.15.6
39
10.15.7-security_update_2021-004
39
10.6.5
39
14.0
38
10.15.7-security_update_2021-005
37
10.2.2
37
10.3.6
37
10.2
36
10.2.8
36
10.3.7
36
10.3.8
36
10.6.6
36
10.7.2
35
10.9
34
10.6.8
33
10.9.1
33
10.2.1
32
10.2.3
32
10.2.4
32
10.2.5
32
10.2.6
32
10.11.1
31
10.14.6-security_update_2021-001
31
10.15.7-security_update_2022-001
31
10.15.7-security_update_2022-002
31
10.2.7
31
10.7.3
31
10.14.6-security_update_2021-002
30
10.15.7-security_update_2021-008
29
10.0
28
10.1
28
10.1.5
27
10.6.7
27
10.0.1
26
10.0.2
26
10.0.3
26
10.0.4
26
10.1.1
26
10.1.2
26
10.1.3
26
10.1.4
26
10.10.5
26
10.13.0
26
10.14.5
26
10.9.2
26
10.9.5
26
10.10.2
24
10.14.6-security_update_2021-003
24
10.9.4
23
10.14.0
22
10.15.7-security_update_2022-003
22
10.7.4
22
10.7.5
21
10.0.0
20
10.1.0
19
10.2.0
19
10.3.0
19
10.9.3
18
10.10.1
17
10.13.6
16
10.13.6-security_update_2019-001
16
10.11.6
15
10.13.6-security_update_2018-002
15
10.13.6-security_update_2018-003
15
10.13.6-security_update_2019-002
15
10.13.6-security_update_2019-003
15
11.0.1
15
10.12.1
14
10.15.5
14
10.15.6-supplemental_update
14
10.11.3
13
10.13.6-security_update_2019-004
13
10.13.6-security_update_2019-005
13
10.13.6-security_update_2019-006
13
10.13.6-security_update_2019-007
13
10.15.7-security_update_2022-004
13
10.8.5-supplemental_update
13
10.12.6
12
10.13.6-security_update_2020-001
12
10.13.6-security_update_2020-002
10
15.0
10
10.12.3
9
10.13
9
10.13.6-security_update_2020-003
9
10.10.0
7
10.11.4
7
10.12.4
7
10.15.3
7
10.11.5
6
10.14.6-security_update_2021-004
6
10.15.2
6
10.15.4
6
11.6
6
10.15.1
5
10.12.0
4
10.12.5
4
10.14.3
4
10.6
4
10.6.9
4
10.12.6-security_update_2019-001
3
10.13.6-supplemental_update
3
10.14.1
3
10.14.2
3
10.14.4
3
10.14.4-beta4
3
11.0.0
3
9.0
3
-
2
10.12
2
10.12.2
2
10.12.6-security_update_2017-001
2
10.12.6-security_update_2018-001
2
10.12.6-security_update_2018-002
2
10.12.6-security_update_2018-003
2
10.12.6-security_update_2018-004
2
10.12.6-security_update_2018-005
2
10.12.6-security_update_2018-006
2
10.12.6-security_update_2019-002
2
10.12.6-security_update_2019-003
2
10.5.2-2008-002
2
11.1
2
11.2
2
8.5
2
8.6
2
9
2
1.0
1
10.11
1
10.11.2
1
10.11.6-security_update_2016-001
1
10.11.6-security_update_2016-002
1
10.11.6-security_update_2016-003
1
10.11.6-security_update_2017-001
1
10.11.6-security_update_2017-002
1
10.11.6-security_update_2017-003
1
10.12.6-security_update_2017-002
1
10.13.6-security_update_2020-004
1
10.15.0
1
10.4.
1
10.6-server
1
11.1.0
1
11.2.1
1
11.3
1
11.3.1
1
11.4
1
11.5
1
12.0.1
1
12.6.7
1
13
1
13.1
1
13.3.3
1
14
1
7.5.3
1
7.6
1
7.6.1
1
8.0
1
8.1
1

Google ChromeInsufficient validation of untrusted input in Intents

First published (updated )

Apple iOS, iPadOS, and watchOSKernel. The issue was addressed with improved memory handling.

EPSS
0.10%
First published (updated )

Apple iOS, iPadOS, and watchOSApple Multiple Products WebKit Out-of-Bounds Read Vulnerability

First published (updated )

Adobe Acrobat ReaderAdobe Flash Player Cross-Site Scripting (XSS) Vulnerability

First published (updated )

Apple iOS, iPadOS, and watchOSColorSync. The issue was addressed with improved memory handling.

EPSS
0.10%
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Apple iOS and macOSAppKit. A logic issue was addressed with improved restrictions.

First published (updated )

Apple iOS, iPadOS, and watchOSBuffer Overflow, Input Validation, Race Condition

First published (updated )

Apple iOS and macOSBuffer Overflow, Input Validation, Race Condition

First published (updated )

Apple iOS, iPadOS, and watchOSInput Validation, Integer Overflow, Race Condition

First published (updated )

Adobe Acrobat ReaderAcrobat Reader | Use After Free (CWE-416)

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Adobe Acrobat ReaderAcrobat Reader | NULL Pointer Dereference (CWE-476)

First published (updated )

Acronis Cyber Protect 16Sensitive information disclosure due to excessive collection of system information. The following pr…

First published (updated )

Apple iOS, iPadOS, and watchOSInput Validation, Null Pointer Dereference

EPSS
0.05%
First published (updated )

Apple iOS, iPadOS, and watchOSBuffer Overflow, Race Condition, Input Validation

First published (updated )

Apple iOS, iPadOS, and watchOSBuffer Overflow, Race Condition, Input Validation

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Apple iOS, iPadOS, and watchOSBuffer Overflow, Race Condition, Input Validation

First published (updated )

Apple iOS, iPadOS, and watchOSBuffer Overflow, Race Condition, Input Validation

First published (updated )

Apple Mobile SafariBuffer Overflow, Race Condition, Input Validation

First published (updated )

Apple macOSRace Condition, Buffer Overflow, Input Validation

First published (updated )

Apple iOS, iPadOS, and watchOSInput Validation, Null Pointer Dereference

EPSS
0.05%
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Apple macOSRace Condition, Use After Free, Input Validation, Null Pointer Dereference

EPSS
0.05%
First published (updated )

Apple iOS, iPadOS, and watchOSInput Validation, Use After Free, Race Condition, Buffer Overflow, Null Pointer Dereference

EPSS
0.06%
First published (updated )

Apple macOSRace Condition, Input Validation, Null Pointer Dereference, Use After Free

EPSS
0.04%
First published (updated )

Apple macOS SequoiaUse After Free, Input Validation, Null Pointer Dereference

EPSS
0.05%
First published (updated )

Apple iOS, iPadOS, and watchOSInput Validation, Null Pointer Dereference, Use After Free, Race Condition

EPSS
0.05%
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Apple iOS, iPadOS, and watchOSUse After Free, Input Validation, Null Pointer Dereference, Race Condition

First published (updated )

Apple iOS, iPadOS, and watchOSAPFS. This issue was addressed through improved state management.

First published (updated )

Apple iOS, iPadOS, and watchOSUse After Free, Input Validation, Null Pointer Dereference, Race Condition

EPSS
0.05%
First published (updated )

Apple iOS, iPadOS, and watchOSBuffer Overflow, Input Validation, Integer Overflow, Use After Free

First published (updated )

Apple iOS, iPadOS, and watchOSBuffer Overflow, Input Validation, Integer Overflow, Use After Free, Race Condition

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203