Adobe AIR bundles the popular SQLite database to serve your application’s relations data storage needs. This makes it simple for applications to persist complex data across sessions. If you are ...
Security firm Check Point has disclosed a major vulnerability in SQLite databases that allow hackers to inject malicious code into devices and then carry out whatever actions on the device they want, ...
Researchers at security conference Def Con 2019 demonstrated a method of exploiting regular database searches to produce malicious results, and used Apple's standard iOS Contacts app to prove it.
SQLite databases can be modified in such a way that they execute malicious code inside other apps that rely on them to store data, security researchers have revealed. In demos presented at the DEF CON ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results