Soumettre #797375: sourcecodester Pharmacy Sales and Inventory System V1.0 SQL injectioninformation

Titresourcecodester Pharmacy Sales and Inventory System V1.0 SQL injection
DescriptionDuring the security review of "Pharmacy Sales and Inventory System",I discovered a critical SQL injection vulnerability in the "/ajax.php?action=chk_prod_availability" file. This vulnerability stems from insufficient user input validation of the 'id‘ parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity. No logi
La source⚠️ https://github.com/lingzezzz/lingze/issues/3
Utilisateur
 lingzezzz (UID 97115)
Soumission05/04/2026 14:38 (il y a 20 jours)
Modérer13/04/2026 10:36 (8 days later)
StatutAccepté
Entrée VulDB357109 [SourceCodester Pharmacy Sales and Inventory System 1.0 ajax.php?action=chk_prod_availability ID injection SQL]
Points20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!