IBM Worklight Foundation 5.x and 6.x before 6.2.0.0, as used in Worklight and Mobile Foundation, allows remote authenticated users to bypass the application-authenticity feature via unspecified vectors.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: ibm

Published: 2014-08-29T10:00:00

Updated: 2024-08-06T09:27:20.266Z

Reserved: 2014-01-06T00:00:00

Link: CVE-2014-0888

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2014-08-29T09:55:07.400

Modified: 2024-11-21T02:02:59.040

Link: CVE-2014-0888

cve-icon Redhat

No data.