Submit #559344: Buffer Overflow Vulnerability in Train Reservation System v1.0 Buffer Overflowinfo

TitleBuffer Overflow Vulnerability in Train Reservation System v1.0 Buffer Overflow
DescriptionThere is a **stack overflow vulnerability** in the `reservation()` function of the Train Reservation System project. The `name` parameter, which is defined as a `char[50]` array in a struct, is read using the unsafe `gets()` function.
Source⚠️ https://github.com/zzzxc643/cve/blob/main/Buffer%20Overflow%20Vulnerability%20in%20Train%20Reservation%20System.md
User
 zzzxc (UID 81185)
Submission04/16/2025 10:11 AM (12 months ago)
Moderation04/28/2025 08:53 AM (12 days later)
StatusAccepted
VulDB entry306403 [code-projects Train Ticket Reservation System 1.0 reservation Name stack-based overflow]
Points17

Interested in the pricing of exploits?

See the underground prices here!