Source |
Security Affairs |
Identifiant |
1256868 |
Date de publication |
2019-08-11 16:18:01 (vue: 2019-08-11 19:00:27) |
Titre |
Gaining remote code execution using a tainted SQLite database |
Texte |
Experts demonstrated that SQLite database can be abused by threat actors as an attack vector to execute malicious code in other apps. Experts at CheckPoint discovered that SQLite database can be abused by threat actors as an attack vector to execute malicious code in other apps, including Apple’s . The experts presented the attack technique at the DEF […]
|
Envoyé |
Oui |
Condensat |
abused actors affairs appeared apps attack attack vector can checkpoint code database def demonstrated discovered execute execution experts first gaining including apple’s malicious other post presented remote security sqlite tainted technique at threat using vector |
Tags |
Threat
|
Stories |
|
Notes |
★★
|
Move |
|