2023-07-27 21:47:25
Arm
PUBLISHED
When the directory containing the installer does not have sufficiently restrictive file permissions, an attacker can modify (or replace) the installer to execute malicious code.