It's possible to access tables not granted to access.
vulners.com/securityvulns/securityvulns:doc:2790