SELECT code_execution FROM * USING SQLite: Eggheads lift the lid on DB security hi-jinks – The Register

DEF CON At the DEF CON hacking conference in Las Vegas on Saturday, infosec gurus from Check Point are scheduled to describe a technique for exploiting SQLite, a database used in applications across every major desktop and mobile operating system, to gain arb…
Read More


  • No comments yet.
  • Add a comment