CVE-2025-0529

A vulnerability, which was classified as critical, was found in code-projects Train Ticket Reservation System 1.0. This affects an unknown part of the component Login Form. The manipulation of the argument username leads to stack-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://code-projects.org/ Product
https://gist.github.com/higordiego/f9943e2e6ba81a02a85dd07c742eecfc Exploit Third Party Advisory
https://vuldb.com/?ctiid.292413 Permissions Required VDB Entry
https://vuldb.com/?id.292413 Third Party Advisory VDB Entry
https://vuldb.com/?submit.478447 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:fabian:train_ticket_reservation_system:1.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-01-17 15:15

Updated : 2025-10-23 20:06


NVD link : CVE-2025-0529

Mitre link : CVE-2025-0529

CVE.ORG link : CVE-2025-0529


JSON object : View

Products Affected

fabian

  • train_ticket_reservation_system
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write