Due to the interaction between a previously installed toolkit and MacAdministrator, it is possible for users to gain read access to hidden files. Successful exploitation of this vulnerability could enable a local user to gain access to systems files, password files, etc. This could lead further attacks against the host.
Due to the interaction between a previously installed toolkit and MacAdministrator, it is possible for users to gain read access to hidden files. Successful exploitation of this vulnerability could enable a local user to gain access to systems files, password files, etc. This could lead further attacks against the host.