Soumettre #768042: SourceCodester Inventory System 1.0 SQL Injectioninformation

TitreSourceCodester Inventory System 1.0 SQL Injection
DescriptionA SQL injection vulnerability exists in SourceCodester Inventory System 1.0. The flaw is located in the file check_item_details.php. By manipulating the POST parameter 'stock_name1', an authenticated attacker can perform UNION-based, boolean-based, or time-based SQL injection. This allows for the direct extraction of database records through the application interface.
La source⚠️ https://github.com/meifukun/Web-Security-PoCs/blob/main/Inventory-System/SQLi-CheckItemDetails-stockname1.md
Utilisateur
 Anonymous User
Soumission26/02/2026 07:19 (il y a 2 mois)
Modérer07/03/2026 21:30 (10 days later)
StatutAccepté
Entrée VulDB349734 [SourceCodester Sales and Inventory System jusqu’à 1.0 /check_item_details.php stock_name1 injection SQL]
Points19

Do you know our Splunk app?

Download it now for free!