結果 : exploitation of database software vulnerabilities