SQLite databases can be modified in such a way that they execute malicious code inside other apps that rely on them to store data, security researchers have revealed. In demos presented at the DEF CON ...
Researchers at security conference Def Con 2019 demonstrated a method of exploiting regular database searches to produce malicious results, and used Apple's standard iOS Contacts app to prove it.
A security vulnerability in the massively popular SQLite database engine puts thousands of desktop and mobile applications at risk. Discovered by Tencent's Blade security team, the vulnerability ...