Security News

Gaining code execution using a malicious SQLite database

Check Point Research recently discovered an innovative method of exploiting SQLite bugs.

Recent research in hacking discovered that simply querying a database may not be as safe as you expect. Using our innovative techniques of Query Hijacking and Query Oriented Programming, we proved that memory corruption issues in SQLite can now be reliably exploited.

Read the full report on Check Point Research:

Leave a Comment

Your email address will not be published.

You may also like