In this article we look at the vulnerabilities associated with enabling SQL Mail and look at ways to work around such security issues