Vulnerability Description
A vulnerability was found in code-projects Simple Banking System up to 1.0. It has been rated as critical. This issue affects some unknown processing of the component Sign In. The manipulation of the argument password2 leads to buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Code-Projects | Simple Banking System | < 1.0 |
Related Weaknesses (CWE)
References
- https://code-projects.org/Product
- https://github.com/zzzxc643/cve/blob/main/Banking_System.mdExploitThird Party Advisory
- https://vuldb.com/?ctiid.308213Permissions RequiredVDB Entry
- https://vuldb.com/?id.308213Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.567082Third Party AdvisoryVDB Entry
- https://github.com/zzzxc643/cve/blob/main/Banking_System.mdExploitThird Party Advisory
FAQ
What is CVE-2025-4497?
CVE-2025-4497 is a vulnerability with a CVSS score of 5.3 (MEDIUM). A vulnerability was found in code-projects Simple Banking System up to 1.0. It has been rated as critical. This issue affects some unknown processing of the component Sign In. The manipulation of the ...
How severe is CVE-2025-4497?
CVE-2025-4497 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-4497?
Check the references section above for vendor advisories and patch information. Affected products include: Code-Projects Simple Banking System.