We are NOT responsible for any damage or illegal actions caused by the use of this program.
Use on your own risk!
Use on your own risk!
SQL injection is yet another common vulnerability that is the result of lax input validation. Unlike cross-site scripting vulnerabilities that are ultimately directed at your site’s visitors, SQL injection is an attack on the site itself—in particular its database. The goal of SQL injection is to insert arbitrary data, most often a database query, into a string that’s eventually executed by the database. The insidious query may attempt any number of actions, from retrieving alternate data, to modifying or removing information from the database
source:http://linuxpoison.blogspot.com/2011/05/13578167755772.html