Home Tags In what type of attack does the attacker send unauthorized commands directly to a database?

in what type of attack does the attacker send unauthorized commands directly to a database?