SELECT code_execution FROM * USING SQLite;

Gaining code execution using a malicious SQLite database Research By: Omer Gull tl;dr SQLite is one of the most deployed software in the world. However, from a security perspective, it has only been examined through the lens of WebSQL and browser exploitation. We believe that this is just the tip of the iceberg. In our... Click to Read More

The post SELECT code_execution FROM * USING SQLite; appeared first on Check Point Research.

Article Link: http://research.checkpoint.com/select-code_execution-from-using-sqlite/