CVE-2014-0888

IBM Worklight Foundation 5.x and 6.x before 6.2.0.0, as used in Worklight and Mobile Foundation, allows remote authenticated users to bypass the application-authenticity feature via unspecified vectors.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ibm:worklight:5.0.0.0:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:5.0.0.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:5.0.0.1:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:5.0.0.1:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:5.0.0.2:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:5.0.0.2:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:5.0.0.3:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:5.0.0.3:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:5.0.5.0:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:5.0.5.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:5.0.5.1:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:5.0.5.1:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:5.0.6.0:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:5.0.6.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:5.0.6.1:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:5.0.6.1:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:5.0.6.2:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:5.0.6.2:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:6.0.0.0:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:6.0.0.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:6.0.0.1:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:6.0.0.1:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:6.0.0.2:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:6.0.0.2:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:6.1.0.0:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:6.1.0.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:6.1.0.1:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:6.1.0.1:*:*:*:enterprise:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:ibm:mobile_foundation:5.0.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:5.0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:5.0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:5.0.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:5.0.5.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:5.0.5.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:5.0.6.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:5.0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:5.0.6.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:6.0.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:6.0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:6.0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:6.1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:6.1.0.1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2014-08-29 09:55

Updated : 2024-02-04 18:35


NVD link : CVE-2014-0888

Mitre link : CVE-2014-0888

CVE.ORG link : CVE-2014-0888


JSON object : View

Products Affected

ibm

  • mobile_foundation
  • worklight
CWE
CWE-264

Permissions, Privileges, and Access Controls