Suppose I do the following:
We assume that the installation will be verified by an attacker. What could be the worst?
Some thoughts:
. , :
select some_function_that_updates() from some_table;
, , :
select * from some_massive_table cross join some_other_massive_table;
, , , ... ,
, "shell", . SQL-. .
MySQL , SHOW .., , SELECT, .
.
. , , , , , .
, , .
"" . , SELECT .
, .
. . . . .
SELECT * FROM table, table, table, table , .
SELECT * FROM table, table, table, table
, " " SQL Server. , " ". . .
?
. , , , .
, , . , . .