IBM Worklight Foundation 5.x and 6.x before 6.2.0.0, as used in Worklight and Mobile Foundation, allows remote authenticated users to bypass the application-authenticity feature via unspecified vectors.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: ibm

Published:

Updated: 2024-08-06T09:27:20.266Z

Reserved: 2014-01-06T00:00:00

Link: CVE-2014-0888

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-08-29T09:55:07.400

Modified: 2025-04-12T10:46:40.837

Link: CVE-2014-0888

cve-icon Redhat

No data.