Security firm Check Point has disclosed a major vulnerability in SQLite databases that allow hackers to inject malicious code into devices and then carry out whatever actions on the device they want, ...
SQLite databases can be modified in such a way that they execute malicious code inside other apps that rely on them to store data, security researchers have revealed. In demos presented at the DEF CON ...
The near-ubiquitous presence of the SQLite database on desktop and mobile operating systems makes it an attractive target for attackers. However, efforts at finding and exploiting vulnerabilities in ...
New vulnerabilities in the SQLite database engine affect a wide range of applications that utilize it as a component within their software packages. SQLite is a relational database management system ...