Логотип exploitDog
bind:CVE-2025-29996
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-29996

Количество 3

Количество 3

nvd логотип

CVE-2025-29996

11 месяцев назад

This vulnerability exists in the CAP back office application due to improper implementation of OTP verification mechanism in its API based login. A remote attacker with valid credentials could exploit this vulnerability by manipulating API request URL/payload. Successful exploitation of this vulnerability could allow the attacker to bypass Two-Factor Authentication (2FA) for other user accounts.

EPSS: Низкий
github логотип

GHSA-9qpx-c9x4-hcg8

11 месяцев назад

This vulnerability exists in the CAP back office application due to improper implementation of OTP verification mechanism in its API based login. A remote attacker with valid credentials could exploit this vulnerability by manipulating API request URL/payload. Successful exploitation of this vulnerability could allow the attacker to bypass Two-Factor Authentication (2FA) for other user accounts.

EPSS: Низкий
fstec логотип

BDU:2026-00047

11 месяцев назад

Уязвимость реализации механизма OTP бэк-офисного приложения Rising Technosoft CAP Back Office Application, позволяющая нарушителю обойти защиту 2FA и получить несанкционированный доступ

CVSS3: 6.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-29996

This vulnerability exists in the CAP back office application due to improper implementation of OTP verification mechanism in its API based login. A remote attacker with valid credentials could exploit this vulnerability by manipulating API request URL/payload. Successful exploitation of this vulnerability could allow the attacker to bypass Two-Factor Authentication (2FA) for other user accounts.

0%
Низкий
11 месяцев назад
github логотип
GHSA-9qpx-c9x4-hcg8

This vulnerability exists in the CAP back office application due to improper implementation of OTP verification mechanism in its API based login. A remote attacker with valid credentials could exploit this vulnerability by manipulating API request URL/payload. Successful exploitation of this vulnerability could allow the attacker to bypass Two-Factor Authentication (2FA) for other user accounts.

0%
Низкий
11 месяцев назад
fstec логотип
BDU:2026-00047

Уязвимость реализации механизма OTP бэк-офисного приложения Rising Technosoft CAP Back Office Application, позволяющая нарушителю обойти защиту 2FA и получить несанкционированный доступ

CVSS3: 6.8
0%
Низкий
11 месяцев назад

Уязвимостей на страницу