Filter
AND
AND

iPadOSUse After Free, Input Validation, Null Pointer Dereference

First published (updated )

Apple iOS, iPadOS, and watchOSApple Multiple Products Use-After-Free Vulnerability

7.8
EPSS
0.21%
Trending
3 Months
First published (updated )

Apple iOS, iPadOS, and watchOSUse After Free, Race Condition, Input Validation

7.5
First published (updated )

Apple macOSRace Condition, Use After Free, Input Validation

7.1
First published (updated )

Apple iOS, iPadOS, and watchOSUse After Free, Input Validation

8.2
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

ubuntu/cupsOpenPrinting CUPS/libppd Postscript Parsing Heap Overflow

7.8
First published (updated )

Apple iOS, iPadOS, and watchOSUse After Free, Input Validation

7.8
First published (updated )

watchOSUse After Free, Input Validation, Race Condition, Buffer Overflow, Null Pointer Dereference

First published (updated )

Apple iOS, iPadOS, and watchOSCommand Injection, Input Validation, Null Pointer Dereference, Use After Free, Race Condition, Buffer Overflow

8.8
EPSS
0.06%
First published (updated )

Apple iOS, iPadOS, and watchOSUse After Free, Race Condition, Input Validation

8.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Apple macOSInput Validation, Race Condition, Use After Free, Buffer Overflow, Null Pointer Dereference, Command Injection

7.5
EPSS
0.05%
First published (updated )

iPadOSInput Validation, Null Pointer Dereference

7.5
EPSS
0.05%
First published (updated )

Apple macOSInput Validation

7.8
First published (updated )

Apple Mobile SafariRace Condition, Input Validation, Null Pointer Dereference, Use After Free

7.5
EPSS
0.05%
First published (updated )

Apple visionOSInput Validation

7.5
EPSS
0.06%
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Apple macOSRace Condition, Use After Free, Input Validation

7.5
First published (updated )

watchOSUse After Free, Input Validation

7.8
First published (updated )

F5 BIG-IP and BIG-IQ Centralized ManagementApache HTTP Server: Crash resulting in Denial of Service in mod_proxy via a malicious request

7.5
First published (updated )

Apple macOSInput Validation, Integer Overflow, Null Pointer Dereference, Use After Free, Race Condition, Buffer Overflow, Command Injection

8.8
EPSS
0.04%
First published (updated )

debian/opensshInput Validation, Integer Overflow, Race Condition, Buffer Overflow

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Apple iOS, iPadOS, and watchOSUse After Free, Input Validation, Null Pointer Dereference

First published (updated )

Apple macOSInput Validation, Null Pointer Dereference, Use After Free, Race Condition, Buffer Overflow

7.1
EPSS
0.04%
First published (updated )

Apple iOS, iPadOS, and watchOSUse After Free, Input Validation

8.1
First published (updated )

iPadOSPath Traversal, Race Condition

7.5
First published (updated )

Apple macOSAPFS. The issue was addressed with improved checks.

8.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Apple macOSPath Traversal, Input Validation, Integer Overflow, Race Condition, Buffer Overflow

8.1
First published (updated )

Apple macOSRace Condition, Input Validation, Buffer Overflow

7.5
First published (updated )

Apple macOSAPFS. The issue was addressed with improved checks.

7.5
First published (updated )

Apple macOSInput Validation, Race Condition

7.8
First published (updated )

Apple macOSAPFS. The issue was addressed with improved checks.

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203