The Simple Inventory Management System v1.0 is susceptible to SQL Injection. The user inputs ($_POST['email'] and $_POST['pwd']) are directly inserted into the SQL query without adequate validation or sanitization, enabling potential manipulation by malicious users. This could lead to the injection of SQL code through specially crafted input, posing a significant security risk.
The Simple Inventory Management System v1.0 is prone to SQL Injection due to user inputs ($_POST['email'] and $_POST['pwd']) being directly used in SQL queries without proper validation, allowing malicious users to manipulate the application. An attacker could inject SQL code through crafted input, potentially leading to unauthorized access.