APPLE-SA-09-16-2024-3 tvOS 18

Read Time:26 Second

Posted by Apple Product Security via Fulldisclosure on Sep 16

APPLE-SA-09-16-2024-3 tvOS 18

tvOS 18 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/121248.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

Game Center
Available for: Apple TV HD and Apple TV 4K (all models)
Impact: An app may be able to access user-sensitive data
Description: A file…

Read More

APPLE-SA-09-16-2024-2 macOS Sequoia 15

Read Time:24 Second

Posted by Apple Product Security via Fulldisclosure on Sep 16

APPLE-SA-09-16-2024-2 macOS Sequoia 15

macOS Sequoia 15 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/121238.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

Accounts
Available for: Mac Studio (2022 and later), iMac (2019 and later), Mac
Pro (2019 and later), Mac Mini (2018 and…

Read More

APPLE-SA-09-16-2024-1 iOS 18 and iPadOS 18

Read Time:26 Second

Posted by Apple Product Security via Fulldisclosure on Sep 16

APPLE-SA-09-16-2024-1 iOS 18 and iPadOS 18

iOS 18 and iPadOS 18 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/121250.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

Accessibility
Available for: iPhone XS and later, iPad Pro 13-inch, iPad Pro 12.9-inch
3rd generation and later, iPad…

Read More

Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution

Read Time:28 Second

Multiple vulnerabilities have been discovered in Apple products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

Read More