Examples/Vulnerable_SqlInjection_2.ps1
|
function Invoke-UnsafeQuery2 { param($nameInput) $cmd = New-Object psobject $cmd.CommandText = "SELECT * FROM Users WHERE UserName='" + $nameInput + "'" return $cmd } |
|
function Invoke-UnsafeQuery2 { param($nameInput) $cmd = New-Object psobject $cmd.CommandText = "SELECT * FROM Users WHERE UserName='" + $nameInput + "'" return $cmd } |