2023-07-27 21:28:08
Arm
PUBLISHED
When the installation directory does not have sufficiently restrictive file permissions, an attacker can modify files in the installation directory to cause execution of malicious code.