Metrics
Affected Vendors & Products
| Link | Providers | 
|---|---|
| https://www.usom.gov.tr/bildirim/tr-25-0201 |     | 
Wed, 20 Aug 2025 19:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | ssvc 
 | 
Wed, 20 Aug 2025 16:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Wed, 20 Aug 2025 08:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Authorization Bypass Through User-Controlled Key vulnerability in Pik Online Yazılım Çözümleri A.Ş. Pik Online allows Exploitation of Trusted Identifiers.This issue affects Pik Online: before 3.1.5. | |
| Title | IDOR in PozitifIK's Pik Online | |
| Weaknesses | CWE-639 | |
| References |  | |
| Metrics | cvssV3_1 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: TR-CERT
Published: 2025-08-20T08:31:52.452Z
Updated: 2025-08-20T18:49:51.996Z
Reserved: 2025-05-27T11:44:36.991Z
Link: CVE-2025-5261
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-08-20T15:22:58.414Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-08-20T09:15:28.020
Modified: 2025-08-20T14:39:07.860
Link: CVE-2025-5261
 Redhat
                        Redhat
                    No data.