IBM Worklight Foundation 5.x and 6.x before 6.2.0.0, as used in Worklight and Mobile Foundation, allows remote authenticated users to bypass the application-authenticity feature via unspecified vectors.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: ibm
Published: 2014-08-29T10:00:00
Updated: 2024-08-06T09:27:20.266Z
Reserved: 2014-01-06T00:00:00
Link: CVE-2014-0888
Vulnrichment
No data.
NVD
Status : Modified
Published: 2014-08-29T09:55:07.400
Modified: 2024-11-21T02:02:59.040
Link: CVE-2014-0888
Redhat
No data.