Tag:

in what type of attack does the attacker send unauthorized commands directly to a database?