First published: Sat May 10 2025(Updated: )
A vulnerability was found in code-projects Simple Banking System up to 1.0. It has been rated as critical. This issue affects some unknown processing of the component Sign In. The manipulation of the argument password2 leads to buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Simple Banking System | <=1.0 | |
Simple Banking System | <1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-4497 has been rated as critical due to its potential for a buffer overflow vulnerability.
To mitigate CVE-2025-4497, upgrade the Simple Banking System to a version later than 1.0.
CVE-2025-4497 affects the Sign In component of the Simple Banking System.
No, exploiting CVE-2025-4497 requires local access to the system.
Yes, the buffer overflow vulnerability in CVE-2025-4497 is triggered by manipulating the password2 argument.