Researchers Show How SQLite Can Be Modified to Attack Apps

New technique involves query hijacking to trigger a wide range of memory safety issues within the widely used database engine, Check Point says.

from Dark Reading: https://ift.tt/33yMyJF
via IFTTT