Authorization Bypass Through User-Controlled Key vulnerability in Turtek Software Eyotek allows Exploitation of Trusted Identifiers.This issue affects Eyotek: before 11.03.2025.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://www.usom.gov.tr/bildirim/tr-25-0163 |
|
History
Mon, 21 Jul 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 21 Jul 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Authorization Bypass Through User-Controlled Key vulnerability in Turtek Software Eyotek allows Exploitation of Trusted Identifiers.This issue affects Eyotek: before 11.03.2025. | |
| Title | IDOR in Turtek Software's Eyotek | |
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: TR-CERT
Published: 2025-07-21T08:35:00.914Z
Updated: 2025-07-21T17:25:16.332Z
Reserved: 2025-02-19T14:35:46.386Z
Link: CVE-2025-1469
Updated: 2025-07-21T17:10:53.085Z
Status : Awaiting Analysis
Published: 2025-07-21T09:15:24.157
Modified: 2025-07-22T13:06:07.260
Link: CVE-2025-1469
No data.