ALERT: Vulnerabilities in Apple Products
Multiple vulnerabilities have been discovered in Apple products, the most severe of which could allow for privilege escalation. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights [...]