- Joined
- 3 Nov 2010
- Messages
- 27,849
- Solutions
- 8
- Reaction score
- 38,401
A new set of SQLite vulnerabilities can allow attackers to remotely run malicious code inside Google Chrome, the world's most popular web browser.
The vulnerabilities, five, in total, are named "Magellan 2.0," and were disclosed today by the Tencent Blade security team.
All apps that use an SQLite database are vulnerable to Magellan 2.0; however, the danger of "remote exploitation" is smaller than the one in Chrome, where a feature called the WebSQL API exposes Chrome users to remote attacks, by default.
Google Chrome impacted by new Magellan 2.0 vulnerabilities | ZDNet
The vulnerabilities, five, in total, are named "Magellan 2.0," and were disclosed today by the Tencent Blade security team.
All apps that use an SQLite database are vulnerable to Magellan 2.0; however, the danger of "remote exploitation" is smaller than the one in Chrome, where a feature called the WebSQL API exposes Chrome users to remote attacks, by default.
Google Chrome impacted by new Magellan 2.0 vulnerabilities | ZDNet