Researchers warn that five vulnerabilities that stem from SQLite could enable remote code execution. …read more

Source:: Threatpost