| Title | Buffer Overflow Vulnerability in Train Reservation System v1.0 Buffer Overflow |
|---|
| Description | There is a **stack overflow vulnerability** in the `reservation()` function of the Train Reservation System project. The `name` parameter, which is defined as a `char[50]` array in a struct, is read using the unsafe `gets()` function. |
|---|
| Source | ⚠️ https://github.com/zzzxc643/cve/blob/main/Buffer%20Overflow%20Vulnerability%20in%20Train%20Reservation%20System.md |
|---|
| User | zzzxc (UID 81185) |
|---|
| Submission | 04/16/2025 10:11 AM (12 months ago) |
|---|
| Moderation | 04/28/2025 08:53 AM (12 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 306403 [code-projects Train Ticket Reservation System 1.0 reservation Name stack-based overflow] |
|---|
| Points | 17 |
|---|