Another remote-code execution hole in top database engine SQLite: How it works, and why not to totally freak out

Cisco Talos researchers have uncovered an SQLite use-after-free() vulnerability that could allow an attacker to, in theory, remotely execute code on an affected device. “An exploitable use after free vulnerability exists in the window function functionality of Sqlite3 3.26.0,”

Read full article on The Register

 


Date:

Categorie(s):