Hi All, When a database is created, two files are created inside "log" and "seg0" folders. These files can replaced with other files. Thus database is open to vulnerabilities.
If we can restrict access to the above mentioned folders, we can get rid of this vulnerability. Thank you.
