Attack potential of the SQL injection flaw

The following are techniques used to manipulate the SQL injection flaw: