SQLite databases can be modified in such a way that they execute malicious code inside other apps that rely on them to store data, security researchers have revealed. In demos presented at the DEF CON ...
The near-ubiquitous presence of the SQLite database on desktop and mobile operating systems makes it an attractive target for attackers. However, efforts at finding and exploiting vulnerabilities in ...