Which of the following is possible in some SQL injection vulnerabilities on certain types of databases that affects the underlying server OS?
Database structure retrieval
Shell command execution
Data manipulation
Data query capabilities
Submit