{keyword}' Union All Select Null,null,null,null,null,null,null,null From Msysaccessobjects-- Udhz -

Are you working on or just curious about how these injection patterns work?

A system table in Access that contains information about database objects. If successful, the attacker can see if they have access to system metadata [1, 4]. Are you working on or just curious about

This is the gold standard. It treats user input as literal text, not executable code [6]. Are you working on or just curious about

Only allow the types of characters you expect (e.g., numbers for an ID field). Are you working on or just curious about

Sources:[1] microsoft.com[2] portswigger.net[3] geeksforgeeks.org[4] sqlinjection.net[5] owasp.org[6] owasp.org

Breaks out of the intended data field in a SQL query.