A vulnerability, which was classified as critical, was found in code-projects Train Ticket Reservation System 1.0. This affects an unknown part of the component Login Form. The manipulation of the argument username leads to stack-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://code-projects.org/ | Product |
| https://gist.github.com/higordiego/f9943e2e6ba81a02a85dd07c742eecfc | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.292413 | Permissions Required VDB Entry |
| https://vuldb.com/?id.292413 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.478447 | Third Party Advisory VDB Entry |
Configurations
History
23 Oct 2025, 20:06
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Fabian
Fabian train Ticket Reservation System |
|
| CPE | cpe:2.3:a:fabian:train_ticket_reservation_system:1.0:*:*:*:*:*:*:* | |
| Summary |
|
|
| CWE | CWE-787 | |
| References | () https://code-projects.org/ - Product | |
| References | () https://gist.github.com/higordiego/f9943e2e6ba81a02a85dd07c742eecfc - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.292413 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.292413 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.478447 - Third Party Advisory, VDB Entry |
17 Jan 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-01-17 15:15
Updated : 2025-10-23 20:06
NVD link : CVE-2025-0529
Mitre link : CVE-2025-0529
CVE.ORG link : CVE-2025-0529
JSON object : View
Products Affected
fabian
- train_ticket_reservation_system
