You’ve heard of ROP? Now get a load of QOP
DEF CON At the DEF CON hacking conference in Las Vegas on Saturday, infosec gurus from Check Point are scheduled to describe a technique for exploiting SQLite, a database used in applications across every major desktop and mobile operating system, to gain arbitrary code execution.…
The Register – Security
Secure Hunter Anti -Malware
The post SELECT code_execution FROM * USING SQLite: Eggheads lift the lid on DB security hi-jinks appeared first on Secure Hunter Anti-Malware.
https://ift.tt/2YGzvHf
Secure Hunter
No comments:
Post a Comment