Unlike vendors such as Microsoft Corp. and Oracle Corp., Apple does not rank the bugs it fixes with a scoring or labeling system.Many of the vulnerabilities can be exploited if attackers are able to trick users into visiting malicious Web sites or open rigged files.