CVE-2014-0888

Severity CVSS v4.0:
Pending analysis
Type:
CWE-264 Permissions, Privileges, and Access Control
Publication date:
29/08/2014
Last modified:
12/04/2025

Description

IBM Worklight Foundation 5.x and 6.x before 6.2.0.0, as used in Worklight and Mobile Foundation, allows remote authenticated users to bypass the application-authenticity feature via unspecified vectors.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:ibm:worklight:5.0.0.0:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:5.0.0.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:5.0.0.1:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:5.0.0.1:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:5.0.0.2:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:5.0.0.2:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:5.0.0.3:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:5.0.0.3:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:5.0.5.0:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:5.0.5.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:5.0.5.1:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:5.0.5.1:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:5.0.6.0:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:5.0.6.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:5.0.6.1:*:*:*:consumer:*:*:*