Researchers exploit a SQLite memory corruption issue outside of a browser. LAS VEGAS – Researchers at Check Point have identified a new class of vulnerabilities targeting SQLite, outside the context ...
The near-ubiquitous presence of the SQLite database on desktop and mobile operating systems makes it an attractive target for attackers. However, efforts at finding and exploiting vulnerabilities in ...
A security vulnerability in the massively popular SQLite database engine puts thousands of desktop and mobile applications at risk. Discovered by Tencent's Blade security team, the vulnerability ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results