Tag: privilege escalation attacks
You are here: Home \ privilege escalation attacks
An insecure Apple authorization API is used by numerous popular third-party application installers and can be abused by attackers ro run code as root.