Filter
AND

Versions

10.15
152
10.15.7
141
10.15.7-supplemental_update
121
10.14.6
115
10.14.6-security_update_2020-002
110
10.14.6-security_update_2020-001
108
10.14.6-security_update_2020-003
106
10.15.7-security_update_2020-001
106
10.14.6-security_update_2020-004
102
10.14.6-security_update_2020-005
99
10.14.6-security_update_2020-006
99
10.15.7-security_update_2021-001
97
10.14.6-security_update_2019-006
93
10.14.6-security_update_2019-007
93
10.14
91
10.14.6-security_update_2019-004
86
10.14.6-security_update_2019-005
86
10.14.6-supplemental_update
86
10.14.6-supplemental_update_2
86
10.15.7-security_update_2020-005
82
10.15.7-security_update_2020-007
81
10.14.6-security_update_2020-007
80
10.15.7-security_update_2021-002
79
10.14.6-security_update_2019-001
77
10.15.7-security_update_2020
77
10.14.6-security_update_2019-002
76
10.15.6
63
10.15.7-security_update_2021-003
60
10.3.9
52
10.14.6-security_update_2021-001
50
10.4.2
49
10.14.6-security_update_2021-002
47
10.4.1
45
10.4.3
44
10.4.6
43
10.4.4
41
10.4.5
41
10.4.8
41
10.14.5
40
10.4.7
39
10.4
38
10.3.3
34
10.15.7-security_update_2021-006
33
10.15.7-security_update_2021-004
32
10.3
32
10.3.2
32
10.3.4
32
10.14.6-security_update_2021-003
31
10.3.1
31
10.4.9
31
10.5.2
31
10.10.4
30
10.3.5
30
10.5.1
30
10.2.8
29
10.2
28
10.2.2
27
10.3.6
27
10.5
27
10.5.3
27
10.5.4
27
10.12.3
24
10.14.0
24
10.2.1
24
10.2.3
24
10.3.7
24
10.5.5
24
10.5.6
24
10.6.0
24
10.15.7-security_update_2021-005
23
10.3.8
23
10.4.11
23
10.13.6
22
10.15.6-supplemental_update
22
10.2.4
22
10.0.3
21
10.15.5
21
10.15.7-security_update_2021-007
21
10.2.5
21
10.2.6
21
10.6.2
21
10.0
20
10.0.1
20
10.0.2
20
10.0.4
20
10.2.7
20
10.5.0
20
10.6.1
20
10.1
19
10.1.1
19
10.1.2
19
10.1.3
19
10.1.4
19
10.1.5
19
10.12.1
19
10.4.10
19
10.5.8
19
10.10.3
18
10.10.5
18
10.13.0
16
10.5.7
16
10.11.5
15
10.13.6-security_update_2018-002
15
10.13.6-security_update_2018-003
15
10.13.6-security_update_2019-001
15
10.13.6-security_update_2019-002
15
10.6.3
15
10.11.6
14
10.12
14
10.13.6-security_update_2019-003
14
10.13.6-security_update_2019-004
14
10.13.6-security_update_2019-005
14
10.13.6-security_update_2019-006
14
10.6.4
14
10.7.0
14
10.10.1
13
10.12.5
13
10.12.6
13
10.13.6-security_update_2019-007
13
10.13.6-security_update_2020-001
13
10.13.6-security_update_2020-002
13
10.11.3
12
10.6.8
12
10.7.1
12
10.14.6-security_update_2021-004
11
10.7.2
11
10.0.0
10
10.12.0
10
10.13
10
10.14.1
10
10.14.3
10
10.15.2
10
10.15.7-security_update_2021-008
10
10.15.7-security_update_2022-001
10
10.6.5
10
10.6.6
10
10.6.7
10
10.9.5
10
10.10.2
9
10.11.4
9
10.12.4
9
10.13.6-security_update_2020-003
9
10.15.1
9
10.15.3
9
10.15.4
9
10.15.7-security_update_2022-002
9
10.4.0
9
10.11.0
8
10.14.2
8
10.14.4
8
10.9.1
8
10.8.5
7
10.1.0
6
10.10.0
6
10.11.6-security_update_2016-001
6
10.11.6-security_update_2016-002
6
10.11.6-security_update_2016-003
6
10.11.6-security_update_2017-001
6
10.11.6-security_update_2017-002
6
10.11.6-security_update_2017-003
6
10.14.4-beta4
6
10.2.0
6
10.3.0
6
10.5.2-2008-002
6
10.8.0
6
10.9
6
10.11
5
10.11.1
5
10.8.1
5
10.8.2
5
10.8.3
5
10.8.4
5
10.11.2
4
10.12.6-security_update_2017-001
4
10.7.3
4
10.11.6-security_update_2017-004
3
10.13.6-security_update_2020-004
3
10.7.4
3
10.12.6-security_update_2018-001
2
10.12.6-security_update_2018-002
2
10.13.6-supplemental_update
2
10.15.0
2
10.15.7-security_update_2022-003
2
10.7.5
2
10.8.5-supplemental_update
2
11.0.0
2
10.11.6-security_update_2017-005
1
10.11.6-security_update_2018-001
1
10.11.6-security_update_2018-002
1
10.12.6-security_update_2017-002
1
10.12.6-security_update_2018-003
1
10.12.6-security_update_2018-004
1
10.12.6-security_update_2018-005
1
10.12.6-security_update_2018-006
1
10.12.6-security_update_2019-001
1
10.12.6-security_update_2019-002
1
10.13.3
1
10.15.7-security_update_2022-004
1
10.4.
1
10.6.9
1
10.9.0
1
10.9.2
1
10.9.3
1
10.9.4
1
11.0.1
1

macOS YosemiteApple iOS, macOS, watchOS Sandbox Bypass Vulnerability

First published (updated )

macOS YosemiteApple macOS Unspecified Vulnerability

First published (updated )

macOS YosemiteApple Multiple Products Type Confusion Vulnerability

First published (updated )

Apple iPadOSApple Multiple Products Code Execution Vulnerability

First published (updated )

watchOSApple Multiple Products Memory Corruption Vulnerability

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Apple macOSApple macOS Use-After-Free Vulnerability

First published (updated )

Apple macOS Mojave Supplemental UpdateApple iOS and macOS Group Facetime Vulnerability

First published (updated )

Apple macOS Mojave Supplemental UpdateApple Multiple Products Memory Corruption Vulnerability

First published (updated )

macOS YosemiteApple OS X Authentication Bypass Vulnerability

First published (updated )

Apple GarageBGarageBand. This issue was addressed by removing the vulnerable code.

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Adobe Acrobat DCAdobe Acrobat and Reader Double Free Vulnerability

First published (updated )

Cisco PIX FirewallNull Pointer Dereference

7.5
First published (updated )

CUPS (Common UNIX Printing System)Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly check the return values o…

7.5
First published (updated )

Node.jsSome HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service

7.8
First published (updated )

Node.jsSome HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

F5 BIG-IP local traffic managerSome HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service

7.8
First published (updated )

F5 BIG-IP Local Traffic ManagerSome HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service

7.8
First published (updated )

Node.jsSome HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service

7.8
First published (updated )

redhat/jbcs-httpd24-httpdSome HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service

7.5
First published (updated )

Node.jsSome HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Adobe ColdFusionAdobe ColdFusion Information Disclosure Vulnerability

First published (updated )

Adobe ColdFusionAdobe ColdFusion Directory Traversal Vulnerability

First published (updated )

Mozilla SeaMonkeyMozilla Network Security Services (NSS) could allow a remote attacker to bypass security restriction…

7.5
First published (updated )

Cisco Advanced Malware Protection (AMP) for EndpointsA vulnerability in Cisco AMP for Endpoints Mac Connector Software installed on Apple macOS 10.12 cou…

7.1
First published (updated )

macOS YosemiteApple Multiple Products Integer Overflow Vulnerability

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

macOS YosemiteApple Multiple Products Race Condition Vulnerability

First published (updated )

Node.jsSome HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service

7.8
First published (updated )

Huawei Honor 20 Pro FirmwareBlutooth BR/EDR specification does not specify sufficient encryption key length and allows an attacker to influence key length negotiation

8.1
First published (updated )

Barracuda VPN ClientThe barracudavpn component of the Barracuda VPN Client prior to version 5.0.2.7 for Linux, macOS, an…

7.8
First published (updated )

watchOSCoreAnimation. A memory initialization issue was addressed with improved memory handling.

8.6
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203