{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-3139","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-04-02T20:47:49.442Z","datePublished":"2025-04-03T04:00:20.465Z","dateUpdated":"2025-04-03T13:14:32.456Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-04-03T04:00:20.465Z"},"title":"code-projects Bus Reservation System Login Form login buffer overflow","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-120","lang":"en","description":"Buffer Overflow"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-119","lang":"en","description":"Memory Corruption"}]}],"affected":[{"vendor":"code-projects","product":"Bus Reservation System","versions":[{"version":"1.0","status":"affected"}],"modules":["Login Form"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in code-projects Bus Reservation System 1.0 and classified as critical. Affected by this issue is the function Login of the component Login Form. The manipulation of the argument Str1 leads to buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used."},{"lang":"de","value":"Eine Schwachstelle wurde in code-projects Bus Reservation System 1.0 gefunden. Sie wurde als kritisch eingestuft. Hierbei geht es um die Funktion Login der Komponente Login Form. Mittels dem Manipulieren des Arguments Str1 mit unbekannten Daten kann eine buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff muss lokal passieren. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":4.8,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.3,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.3,"vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4.3,"vectorString":"AV:L/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2025-04-02T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-04-02T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-04-02T22:52:55.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Lxxxt (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.303044","name":"VDB-303044 | code-projects Bus Reservation System Login Form login buffer overflow","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.303044","name":"VDB-303044 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.525305","name":"Submit #525305 | code-projects bus-reservation-system-in-c-programming c v1.0 Buffer Overflow","tags":["third-party-advisory"]},{"url":"https://github.com/LxxxtSec/CVE/blob/main/CVE-Lxxxt.md","tags":["broken-link","exploit"]},{"url":"https://code-projects.org/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-03T13:14:17.196459Z","id":"CVE-2025-3139","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-03T13:14:32.456Z"}}]}}