Are you working on or just curious about how these injection patterns work?
Only allow the types of characters you expect (e.g., numbers for an ID field).
Appends a new set of results to the original query [2, 5].
A system table in Access that contains information about database objects. If successful, the attacker can see if they have access to system metadata [1, 4].