When they need a relational database, software developers and system administrators often choose MySQL or PostgreSQL. For a lighter and simpler solution, however, developers should consider SQLite. It ...
SQLite databases can be modified in such a way that they execute malicious code inside other apps that rely on them to store data, security researchers have revealed. In demos presented at the DEF CON ...
Researchers exploit a SQLite memory corruption issue outside of a browser. LAS VEGAS – Researchers at Check Point have identified a new class of vulnerabilities targeting SQLite, outside the context ...