Hi All,

When a database is created, two files are created inside "log" and "seg0"
folders. These files can  replaced with other files. Thus database is open
to vulnerabilities.

If we can restrict access to the above mentioned folders, we can get rid of
this vulnerability.

Thank you.

Reply via email to