CVE-2014-0888

IBM Worklight Foundation 5.x and 6.x before 6.2.0.0, as used in Worklight and Mobile Foundation, allows remote authenticated users to bypass the application-authenticity feature via unspecified vectors.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.9 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:S/C:N/I:P/A:P
ibmCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 39%
VendorProductVersion
ibmworklight
5.0.0.0
ibmworklight
5.0.0.0
ibmworklight
5.0.0.1
ibmworklight
5.0.0.1
ibmworklight
5.0.0.2
ibmworklight
5.0.0.2
ibmworklight
5.0.0.3
ibmworklight
5.0.0.3
ibmworklight
5.0.5.0
ibmworklight
5.0.5.0
ibmworklight
5.0.5.1
ibmworklight
5.0.5.1
ibmworklight
5.0.6.0
ibmworklight
5.0.6.0
ibmworklight
5.0.6.1
ibmworklight
5.0.6.1
ibmworklight
5.0.6.2
ibmworklight
5.0.6.2
ibmworklight
6.0.0.0
ibmworklight
6.0.0.0
ibmworklight
6.0.0.1
ibmworklight
6.0.0.1
ibmworklight
6.0.0.2
ibmworklight
6.0.0.2
ibmworklight
6.1.0.0
ibmworklight
6.1.0.0
ibmworklight
6.1.0.1
ibmworklight
6.1.0.1
ibmmobile_foundation
5.0.0.0
ibmmobile_foundation
5.0.0.1
ibmmobile_foundation
5.0.0.2
ibmmobile_foundation
5.0.0.3
ibmmobile_foundation
5.0.5.0
ibmmobile_foundation
5.0.5.1
ibmmobile_foundation
5.0.6.0
ibmmobile_foundation
5.0.6.1
ibmmobile_foundation
5.0.6.2
ibmmobile_foundation
6.0.0.0
ibmmobile_foundation
6.0.0.1
ibmmobile_foundation
6.0.0.2
ibmmobile_foundation
6.1.0.0
ibmmobile_foundation
6.1.0.1
𝑥
= Vulnerable software versions
Common Weakness Enumeration