Gaining remote code execution using a tainted SQLite database

Experts demonstrated that SQLite database can be abused by threat actors as an attack vector to execute malicious code in other apps. Experts at CheckPoint discovered that SQLite database can be abused by threat actors as an attack vector to execute malicious code in other apps, including Apple’s .

Read full article on Security Affairs

 


Date:

Categorie(s):