We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability has been found in code-projects Theater Seat Booking System 1.0 and classified as critical. Affected by this vulnerability is the function cancel. The manipulation of the argument cancelcustomername leads to stack-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.
In code-projects Theater Seat Booking System 1.0 wurde eine Schwachstelle gefunden. Sie wurde als kritisch eingestuft. Hierbei betrifft es die Funktion cancel. Mittels Manipulieren des Arguments cancelcustomername mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff muss lokal angegangen werden. Der Exploit steht zur öffentlichen Verfügung.
2025-04-29: | Advisory disclosed |
2025-04-29: | VulDB entry created |
2025-04-29: | VulDB entry last update |
zzzxc (VulDB User)
vuldb.com/?id.306499 (VDB-306499 | code-projects Theater Seat Booking System cancel stack-based overflow)
vuldb.com/?ctiid.306499 (VDB-306499 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.559452 (Submit #559452 | Theatre_booking_System stack overflow in cancel function v1.0 Buffer Overflow)
github.com/zzzxc643/cve/blob/main/Theatre_booking_System.md
code-projects.org/
Support options