Authorization Bypass Through User-Controlled Key vulnerability in Turtek Software Eyotek allows Exploitation of Trusted Identifiers.This issue affects Eyotek: before 11.03.2025.
                
            Metrics
Affected Vendors & Products
References
        | Link | Providers | 
|---|---|
| https://www.usom.gov.tr/bildirim/tr-25-0163 |     | 
History
                    Mon, 21 Jul 2025 18:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Mon, 21 Jul 2025 09:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Authorization Bypass Through User-Controlled Key vulnerability in Turtek Software Eyotek allows Exploitation of Trusted Identifiers.This issue affects Eyotek: before 11.03.2025. | |
| Title | IDOR in Turtek Software's Eyotek | |
| Weaknesses | CWE-639 | |
| References |  | |
| Metrics | cvssV3_1 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: TR-CERT
Published: 2025-07-21T08:35:00.914Z
Updated: 2025-07-21T17:25:16.332Z
Reserved: 2025-02-19T14:35:46.386Z
Link: CVE-2025-1469
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-07-21T17:10:53.085Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-07-21T09:15:24.157
Modified: 2025-07-22T13:06:07.260
Link: CVE-2025-1469
 Redhat
                        Redhat
                    No data.