An insecure Apple authorization API is used by numerous popular third-party application installers and can be abused by attackers ro run code as root.
Source: Threadpost