A vulnerability classified as critical was found in code-projects School Billing System 1.0. This vulnerability affects the function searchrec. The manipulation of the argument Name leads to stack-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://code-projects.org/ | Product |
https://github.com/zzzxc643/cve/blob/main/SCHOOL_BILLING_SYSTEM.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.306514 | Permissions Required VDB Entry |
https://vuldb.com/?id.306514 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.560534 | Third Party Advisory VDB Entry |
Configurations
History
14 May 2025, 20:12
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-29 18:15
Updated : 2025-05-14 20:12
NVD link : CVE-2025-4077
Mitre link : CVE-2025-4077
CVE.ORG link : CVE-2025-4077
JSON object : View
Products Affected
fabian
- school_billing_system