资讯

Researchers at security conference Def Con 2019 demonstrated a method of exploiting regular database searches to produce malicious results, and used Apple's standard iOS Contacts app to prove it.
The SQLite exploit can be accessed thanks to a known bug in iOS’s Contacts app that has existed for four years now without a fix. Security firm Check Point has disclosed a major vulnerability in ...
SQLite databases can be modified in such a way that they execute malicious code inside other apps that rely on them to store data, security researchers have revealed. In demos presented at the DEF CON ...
A security vulnerability in the massively popular SQLite database engine puts thousands of desktop and mobile applications at risk. Discovered by Tencent's Blade security team, the vulnerability ...