Databases at war
"Databases shouldn’t by rights have security holes in them at all, but years after they were first discovered to be an issue, they are still very much with us.
These holes open up in a number of ways, principally related to gaining privileges to execute or spoof (inject) scripts in the dominant query form SQL, or attempting to compromise or damage the operating system or other applications running on, or in conjunction with, the database."