Filter
AND
-Infinity
0

Apple macOSRace Condition, Input Validation

EPSS
0.04%
First published (updated )

Apple macOSInput Validation, Null Pointer Dereference, Use After Free

EPSS
0.04%
First published (updated )

Apple iOS, iPadOS, and watchOSInput Validation

EPSS
0.04%
First published (updated )

Apple iOS, iPadOS, and watchOSInput Validation, Use After Free, Race Condition, Buffer Overflow, Null Pointer Dereference

EPSS
0.04%
First published (updated )

Apple macOSRace Condition, Use After Free, Input Validation, Null Pointer Dereference

EPSS
0.04%
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Apple iOS and macOSUse After Free, Race Condition, Input Validation

First published (updated )

Apple iOS and macOSUse After Free, Input Validation

First published (updated )

Apple iOS, iPadOS, and watchOSUse After Free, Race Condition, Input Validation

First published (updated )

Apple iOS, iPadOS, and watchOSUse After Free, Race Condition, Input Validation

First published (updated )

Apple iOS, iPadOS, and watchOSRace Condition, Use After Free, Input Validation

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Apple iOS, iPadOS, and watchOSUse After Free, Input Validation

First published (updated )

Apple iOS, iPadOS, and watchOSUse After Free, Race Condition, Input Validation

First published (updated )

Apple iOS, iPadOS, and watchOSAPFS. This issue was addressed through improved state management.

First published (updated )

Visual Studio Community 2022.NET and Visual Studio Remote Code Execution Vulnerability

First published (updated )

Apple iOS, iPadOS, and macOSInput Validation, Use After Free

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

macOSInput Validation, Use After Free, Race Condition

First published (updated )

Mozilla FocusFocus was incorrectly allowing internal links to utilize the app scheme used for deeplinking, which …

First published (updated )

Apple iOS, iPadOS, and macOSInput Validation

First published (updated )

Apple iOS, iPadOS, and macOSInput Validation

First published (updated )

Apple iOS, iPadOS, and macOSInput Validation

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

FirefoxOpening an external link to an HTTP website when Firefox iOS was previously closed and had an HTTPS …

First published (updated )

macOSRace Condition

First published (updated )

macOSRace Condition

First published (updated )

Apple iOS, iPadOS, and macOSRace Condition, Input Validation, Integer Overflow

First published (updated )

Apple iOS, iPadOS, and watchOSInput Validation, Race Condition, Use After Free, XEE, Integer Overflow

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

FirefoxXSS

First published (updated )

Apple iOS, iPadOS, and watchOSUse After Free, Input Validation, Race Condition, Integer Overflow, Buffer Overflow

First published (updated )

Apple iOS, iPadOS, and watchOSInput Validation, Race Condition, Integer Overflow, Use After Free, Buffer Overflow

First published (updated )

Apache HTTP ServerApache HTTP Server may use exploitable/malicious backend application output to run local handlers via internal redirect

First published (updated )

VMware Workstation and ESXiUse After Free

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203