Vulnerabilities
Vulnerable Software
Arm:  >> Arm Development Studio  Security Vulnerabilities
When the directory containing the installer does not have sufficiently restrictive file permissions, an attacker can modify (or replace) the installer to execute malicious code.
CVSS Score
7.8
EPSS Score
0.0
Published
2023-07-27
An installer that loads or executes files using an unconstrained search path may be vulnerable to substitute files under control of an attacker being loaded or executed instead of the intended files.
CVSS Score
7.8
EPSS Score
0.001
Published
2023-07-27
When the installation directory does not have sufficiently restrictive file permissions, an attacker can modify files in the installation directory to cause execution of malicious code.
CVSS Score
7.8
EPSS Score
0.001
Published
2023-07-27


Contact Us

Shodan ® - All rights reserved