On 8/3/17, 8:27 AM, "sqlite-users on behalf of Ulrich Telle" <sqlite-users-boun...@mailinglists.sqlite.org on behalf of ulrich.te...@gmx.de> wrote: > I really don't think that the latter is true. To overcome the restriction is > extremly simple, if you don't care about memory leaks. Just do [...]
If you’re creating a malicious extension, sure. But if you’re creating an exploit this seems like an odd way to go about it. It’d be simpler to implement something like “SELECT root_shell_on_port(1337);” _______________________________________________ sqlite-users mailing list sqlite-users@mailinglists.sqlite.org http://mailinglists.sqlite.org/cgi-bin/mailman/listinfo/sqlite-users