On 8/3/17, 8:27 AM, "sqlite-users on behalf of Ulrich Telle" <[email protected] on behalf of [email protected]> wrote: > I really don't think that the latter is true. To overcome the restriction is > extremly simple, if you don't care about memory leaks. Just do [...]
If you’re creating a malicious extension, sure. But if you’re creating an exploit this seems like an odd way to go about it. It’d be simpler to implement something like “SELECT root_shell_on_port(1337);” _______________________________________________ sqlite-users mailing list [email protected] http://mailinglists.sqlite.org/cgi-bin/mailman/listinfo/sqlite-users

