Introduction - If you have any usage issues, please Google them yourself
A malicious attacker is likely to get SQL Server weak password, access to SA' s weak passwords, then we can get a large extent the system administrator privileges, provided that the other SQL server is installed in the system under the authority of