Hi All,

When a database is created, two files are created inside "log" and "seg0"
folders. These files can be replaced with other files. Thus database is
open to vulnerabilities.

If we can restrict access to the above mentioned folders, we can get rid of
this vulnerability.

Thank you.

Reply via email to