提交 #768042: SourceCodester Inventory System 1.0 SQL Injection信息

标题SourceCodester Inventory System 1.0 SQL Injection
描述A SQL injection vulnerability exists in SourceCodester Inventory System 1.0. The flaw is located in the file check_item_details.php. By manipulating the POST parameter 'stock_name1', an authenticated attacker can perform UNION-based, boolean-based, or time-based SQL injection. This allows for the direct extraction of database records through the application interface.
来源⚠️ https://github.com/meifukun/Web-Security-PoCs/blob/main/Inventory-System/SQLi-CheckItemDetails-stockname1.md
用户
 Anonymous User
提交2026-02-26 07時19分 (1 月前)
管理2026-03-07 21時30分 (10 days later)
状态已接受
VulDB条目349734 [SourceCodester Sales and Inventory System 直到 1.0 /check_item_details.php stock_name1 SQL注入]
积分19

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!