A vulnerability was found in code-projects Simple Banking System up to 1.0. It has been rated as critical. This issue affects some unknown processing of the component Sign In. The manipulation of the argument password2 leads to buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://code-projects.org/ | Product |
https://github.com/zzzxc643/cve/blob/main/Banking_System.md | Exploit Third Party Advisory |
https://github.com/zzzxc643/cve/blob/main/Banking_System.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.308213 | Permissions Required VDB Entry |
https://vuldb.com/?id.308213 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.567082 | Third Party Advisory VDB Entry |
Configurations
History
16 May 2025, 14:51
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:code-projects:simple_banking_system:*:*:*:*:*:*:*:* | |
CWE | CWE-120 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
First Time |
Code-projects simple Banking System
Code-projects |
|
References | () https://vuldb.com/?ctiid.308213 - Permissions Required, VDB Entry | |
References | () https://github.com/zzzxc643/cve/blob/main/Banking_System.md - Exploit, Third Party Advisory | |
References | () https://code-projects.org/ - Product | |
References | () https://vuldb.com/?id.308213 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.567082 - Third Party Advisory, VDB Entry |
12 May 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-119 |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
10 May 2025, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-10 07:15
Updated : 2025-05-16 14:51
NVD link : CVE-2025-4497
Mitre link : CVE-2025-4497
JSON object : View
Products Affected
code-projects
- simple_banking_system
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')