Description: "A buffer overflow vulnerability in Code::Blocks 17.12 allows an attacker to execute arbitrary code via a crafted project file."
Seemingly still vulnerable. At least, I was able to get a stack trace full of 0x41's after following the reproduction instructions and trying to make a debug build. Unfortunately, upstream's closed the report as invalid and URL is dead after their domain expired. Wayback link: https://web.archive.org/web/20200818054319/https://www.povonsec.com/codeblocks-security-vulnerability/
Actually, upon some reflection I'm inclined to agree with upstream. If an attacker can manipulate someone into loading a malicious codeblocks project, they could probably do whatever they wanted via the code in that project anyway.