CVE-2014-0888
29.08.2014, 09:55
IBM Worklight Foundation 5.x and 6.x before 6.2.0.0, as used in Worklight and Mobile Foundation, allows remote authenticated users to bypass the application-authenticity feature via unspecified vectors.Enginsight
| Vendor | Product | Version |
|---|---|---|
| ibm | worklight | 5.0.0.0 |
| ibm | worklight | 5.0.0.0 |
| ibm | worklight | 5.0.0.1 |
| ibm | worklight | 5.0.0.1 |
| ibm | worklight | 5.0.0.2 |
| ibm | worklight | 5.0.0.2 |
| ibm | worklight | 5.0.0.3 |
| ibm | worklight | 5.0.0.3 |
| ibm | worklight | 5.0.5.0 |
| ibm | worklight | 5.0.5.0 |
| ibm | worklight | 5.0.5.1 |
| ibm | worklight | 5.0.5.1 |
| ibm | worklight | 5.0.6.0 |
| ibm | worklight | 5.0.6.0 |
| ibm | worklight | 5.0.6.1 |
| ibm | worklight | 5.0.6.1 |
| ibm | worklight | 5.0.6.2 |
| ibm | worklight | 5.0.6.2 |
| ibm | worklight | 6.0.0.0 |
| ibm | worklight | 6.0.0.0 |
| ibm | worklight | 6.0.0.1 |
| ibm | worklight | 6.0.0.1 |
| ibm | worklight | 6.0.0.2 |
| ibm | worklight | 6.0.0.2 |
| ibm | worklight | 6.1.0.0 |
| ibm | worklight | 6.1.0.0 |
| ibm | worklight | 6.1.0.1 |
| ibm | worklight | 6.1.0.1 |
| ibm | mobile_foundation | 5.0.0.0 |
| ibm | mobile_foundation | 5.0.0.1 |
| ibm | mobile_foundation | 5.0.0.2 |
| ibm | mobile_foundation | 5.0.0.3 |
| ibm | mobile_foundation | 5.0.5.0 |
| ibm | mobile_foundation | 5.0.5.1 |
| ibm | mobile_foundation | 5.0.6.0 |
| ibm | mobile_foundation | 5.0.6.1 |
| ibm | mobile_foundation | 5.0.6.2 |
| ibm | mobile_foundation | 6.0.0.0 |
| ibm | mobile_foundation | 6.0.0.1 |
| ibm | mobile_foundation | 6.0.0.2 |
| ibm | mobile_foundation | 6.1.0.0 |
| ibm | mobile_foundation | 6.1.0.1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration