CVE-2025-4497

A vulnerability was found in code-projects Simple Banking System up to 1.0. It has been rated as critical. This issue affects some unknown processing of the component Sign In. The manipulation of the argument password2 leads to buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://code-projects.org/ Product
https://github.com/zzzxc643/cve/blob/main/Banking_System.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.308213 Permissions Required VDB Entry
https://vuldb.com/?id.308213 Third Party Advisory VDB Entry
https://vuldb.com/?submit.567082 Third Party Advisory VDB Entry
https://github.com/zzzxc643/cve/blob/main/Banking_System.md Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:code-projects:simple_banking_system:*:*:*:*:*:*:*:*

History

16 May 2025, 14:51

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-10 07:15

Updated : 2025-05-16 14:51


NVD link : CVE-2025-4497

Mitre link : CVE-2025-4497

CVE.ORG link : CVE-2025-4497


JSON object : View

Products Affected

code-projects

  • simple_banking_system
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')