Multiple Vulnerabilities in Apple Products
Multiple vulnerabilities have been found in Apple products, the most severe of which could allow for arbitrary code execution. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Read to learn how to protect against this.