Multiple vulnerabilities have been reported in Apple Products which could allow an attacker to execute arbitrary code, gain elevated privileges, disclose sensitive information, bypass security restrictions or can cause denial of service condition on the targeted system.
Target Audience:
Individuals and organizational users using Apple products
Risk Assessment:
High risk of unauthorized access to sensitive data, service disruptions, and complete system compromise.
Impact Assessment:
Potential for data theft, propagation of malware, and system crash.
The information provided herein is on "as is" basis, without warranty of any kind.