Gaining remote code execution using a tainted SQLite database Experts demonstrated that SQLite database can be abused by threat actors as an attack vector to execute malicious […]