Researchers exploit a SQLite memory corruption issue outside of a browser. LAS VEGAS – Researchers at Check Point have identified a new class of vulnerabilities targeting SQLite, outside the context ...
A new set of SQLite vulnerabilities can allow attackers to remotely run malicious code inside Google Chrome, the world's most popular web browser. The vulnerabilities, five, in total, are named ...