We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability was found in SourceCodester Airport Booking Management System 1.0 and classified as critical. Affected by this issue is the function Details. The manipulation of the argument passport/name leads to buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
Eine Schwachstelle wurde in SourceCodester Airport Booking Management System 1.0 gefunden. Sie wurde als kritisch eingestuft. Davon betroffen ist die Funktion Details. Durch die Manipulation des Arguments passport/name mit unbekannten Daten kann eine buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff muss lokal passieren. Der Exploit steht zur öffentlichen Verfügung.
2024-10-30: | Advisory disclosed |
2024-10-30: | VulDB entry created |
2025-04-03: | VulDB entry last update |
YANG HUA (VulDB User)
vuldb.com/?id.282560 (VDB-282560 | SourceCodester Airport Booking Management System details buffer overflow)
vuldb.com/?ctiid.282560 (VDB-282560 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.433262 (Submit #433262 | SourceCodester Airport Booking Management System in C with Source Code 1.0 Buffer Overflow)
github.com/CveSecLook/cve/issues/64
www.sourcecodester.com/
Support options