May 13, 2024, 6:04 p.m. |

Center for Internet Security - Multi-State Information Sharing and Analysis Center www.cisecurity.org

Multiple vulnerabilities have been discovered in Apple products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on …

apple arbitrary code arbitrary code execution code code execution context exploitation privileges products vulnerabilities

More from www.cisecurity.org / Center for Internet Security - Multi-State Information Sharing and Analysis Center

Sr. Product Manager

@ MixMode | Remote, US

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Cyber Security Specialist

@ Ball Corporation | SAO JOSE DOS CAMPOS, São Paulo, BR, 12242-000

Cybersecurity Strategy & Data Systems Manager

@ Mitsubishi Heavy Industries | Orlando, FL, US, 32809