Gaining remote code execution using a tainted SQLite database
Experts demonstrated that SQLite database can be abused by threat actors as an attack vector to execute malicious code in other apps.
Experts demonstrated that SQLite database can be abused by threat actors as an attack vector to execute malicious code in other apps.