Security firm Check Point has disclosed a major vulnerability in SQLite databases that allow hackers to inject malicious code into devices and then carry out whatever actions on the device they want, ...
Researchers at security conference Def Con 2019 demonstrated a method of exploiting regular database searches to produce malicious results, and used Apple's standard iOS Contacts app to prove it.