Researchers exploit a SQLite memory corruption issue outside of a browser. LAS VEGAS – Researchers at Check Point have identified a new class of vulnerabilities targeting SQLite, outside the context ...
Researchers at security conference Def Con 2019 demonstrated a method of exploiting regular database searches to produce malicious results, and used Apple's standard iOS Contacts app to prove it.