<?xml version="1.0" encoding="UTF-8"?>
<VrdaData refvuldefversion="1.2" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://vrda.jpcert.or.jp" xsi:schemaLocation="http://vrda.jpcert.or.jp/feed/xsd/vrda_data.xsd">
  <VrdaDataProvider>
    <Name>JVN iPedia</Name>
    <URL>http://jvndb.jvn.jp</URL>
  </VrdaDataProvider>
  <VrdaDataSourceType>Advisory</VrdaDataSourceType>
  <Vulinfo revisionno="1" lang="ja" invalidated="false">
    <VulinfoID>JVNDB-2026-006683</VulinfoID>
    <VulinfoData>
      <Title>ahsanriaz26@gmail.com&#12398;Sales and Inventory System in PHP/MySQLi with Source Code&#12395;&#12362;&#12369;&#12427;&#35079;&#25968;&#12398;&#33030;&#24369;&#24615;</Title>
      <VulinfoDescription>
        <Overview>SourceCodester Sales and Inventory System &#12496;&#12540;&#12472;&#12519;&#12531;1.0&#12414;&#12391;&#12395;&#33030;&#24369;&#24615;&#12364;&#29305;&#23450;&#12373;&#12428;&#12414;&#12375;&#12383;&#12290;&#24433;&#38911;&#12434;&#21463;&#12369;&#12427;&#12398;&#12399; /check_item_details.php &#12501;&#12449;&#12452;&#12523;&#20869;&#12398;&#19981;&#26126;&#12394;&#38306;&#25968;&#12391;&#12377;&#12290;&#24341;&#25968; stock_name1 &#12398;&#25805;&#20316;&#12395;&#12424;&#12426;SQL&#12452;&#12531;&#12472;&#12455;&#12463;&#12471;&#12519;&#12531;&#12364;&#30330;&#29983;&#12375;&#12414;&#12377;&#12290;&#12371;&#12398;&#25915;&#25731;&#12399;&#12522;&#12514;&#12540;&#12488;&#12363;&#12425;&#38283;&#22987;&#12373;&#12428;&#12427;&#21487;&#33021;&#24615;&#12364;&#12354;&#12426;&#12414;&#12377;&#12290;&#12456;&#12463;&#12473;&#12503;&#12525;&#12452;&#12488;&#12364;&#20844;&#38283;&#12373;&#12428;&#12390;&#12362;&#12426;&#12289;&#24746;&#29992;&#12373;&#12428;&#12427;&#21487;&#33021;&#24615;&#12364;&#12354;&#12426;&#12414;&#12377;&#12290;</Overview>
      </VulinfoDescription>
      <Affected>
        <AffectedItem affectedstatus="vulnerable">
          <Lapt>cpe:/a:ahsanriaz26gmailcom:sales_and_inventory_system</Lapt>
        </AffectedItem>
      </Affected>
      <FactAnalysis>
        <AccessComplexity>Low</AccessComplexity>
        <AccessVector>Network</AccessVector>
        <Authentication>Single Instance</Authentication>
        <AvailabilityImpact>Partial</AvailabilityImpact>
        <ConfidentialityImpact>Partial</ConfidentialityImpact>
        <IntegrityImpact>Partial</IntegrityImpact>
      </FactAnalysis>
      <Related>
        <RelatedItem relationtype="self" origin="jvnipedia">
          <URL>https://jvndb.jvn.jp/ja/contents/2026/JVNDB-2026-006683.html</URL>
        </RelatedItem>
        <RelatedItem relationtype="alternate" origin="other">
          <Name>Common Vulnerabilities and Exposures (CVE)</Name>
          <VulinfoID>CVE-2026-3756</VulinfoID>
          <URL>https://www.cve.org/CVERecord?id=CVE-2026-3756</URL>
        </RelatedItem>
        <RelatedItem relationtype="alternate" origin="other">
          <Name>National Vulnerability Database (NVD)</Name>
          <VulinfoID>CVE-2026-3756</VulinfoID>
          <URL>https://nvd.nist.gov/vuln/detail/CVE-2026-3756</URL>
        </RelatedItem>
        <RelatedItem relationtype="alternate" origin="other">
          <Name>VulDB</Name>
          <VulinfoID>CVE-2026-3756 SourceCodester Sales and Inventory System check_item_details.php sql injection (EUVD-2026-10259)</VulinfoID>
          <URL>https://vuldb.com/?id.349734</URL>
        </RelatedItem>
        <RelatedItem relationtype="reference" origin="other">
          <Name>GitHub</Name>
          <VulinfoID>Web-Security-PoCs/Inventory-System/SQLi-CheckItemDetails-stockname1.md at main  meifukun/Web-Security-PoCs  GitHub</VulinfoID>
          <URL>https://github.com/meifukun/Web-Security-PoCs/blob/main/Inventory-System/SQLi-CheckItemDetails-stockname1.md</URL>
        </RelatedItem>
        <RelatedItem relationtype="reference" origin="other">
          <Name>JVNDB</Name>
          <VulinfoID>CWE-74</VulinfoID>
          <Title>&#12452;&#12531;&#12472;&#12455;&#12463;&#12471;&#12519;&#12531;</Title>
          <URL>https://cwe.mitre.org/data/definitions/74.html</URL>
        </RelatedItem>
        <RelatedItem relationtype="reference" origin="other">
          <Name>JVNDB</Name>
          <VulinfoID>CWE-89</VulinfoID>
          <Title>SQL&#12452;&#12531;&#12472;&#12455;&#12463;&#12471;&#12519;&#12531;</Title>
          <URL>https://jvndb.jvn.jp/ja/cwe/CWE-89.html</URL>
        </RelatedItem>
        <RelatedItem relationtype="reference" origin="other">
          <Name>VulDB</Name>
          <VulinfoID>https://vuldb.com/?submit.768042</VulinfoID>
          <URL>https://vuldb.com/?submit.768042</URL>
        </RelatedItem>
        <RelatedItem relationtype="reference" origin="other">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>Free Source Code Projects and Tutorials - sourcecodester.com</VulinfoID>
          <URL>https://www.sourcecodester.com/</URL>
        </RelatedItem>
      </Related>
      <DateFirstPublished>2026-03-11T16:06:00+09:00</DateFirstPublished>
      <DateLastUpdated>2026-03-11T16:06:00+09:00</DateLastUpdated>
    </VulinfoData>
  </Vulinfo>
</VrdaData>
