Apple Devices Vulnerable iOS,iPadOS, WatchOS, tvOS,Xcode,Safari, iTunes
Multiple vulnerabilities have been discovered in Apple Products, the most severe of these could result in arbitrary code execution within the context of the application, an attacker gaining the same privileges as the logged-on user, or the bypassing of security restrictions. Depending on the permission associated with the application running the exploit, an attacker could then install programs; view, change, or delete data.