Multiple vulnerabilities were identified in Apple products, a remote attacker could exploit some of these vulnerabilities to trigger cross site scripting, denial of service, remote code execution and security restriction bypass on the targeted system.





Source link

You must be logged in to post a comment.