Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-12627 | A vulnerability, which was classified as critical, has been found in code-projects Product Management System 1.0. Affected by this issue is the function add_item. The manipulation of the argument st.productname leads to stack-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. |
Wed, 28 May 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Code-projects
Code-projects product Management System |
|
| CPEs | cpe:2.3:a:code-projects:product_management_system:1.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Code-projects
Code-projects product Management System |
Tue, 29 Apr 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 29 Apr 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability, which was classified as critical, has been found in code-projects Product Management System 1.0. Affected by this issue is the function add_item. The manipulation of the argument st.productname leads to stack-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. | |
| Title | code-projects Product Management System add_item stack-based overflow | |
| Weaknesses | CWE-119 CWE-121 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-04-29T17:48:56.628Z
Reserved: 2025-04-29T05:29:59.628Z
Link: CVE-2025-4069
Updated: 2025-04-29T17:48:49.588Z
Status : Analyzed
Published: 2025-04-29T16:15:38.350
Modified: 2025-05-28T17:26:13.450
Link: CVE-2025-4069
No data.
OpenCVE Enrichment
No data.
EUVD