IBM Worklight Foundation 5.x and 6.x before 6.2.0.0, as used in Worklight and Mobile Foundation, allows remote authenticated users to bypass the application-authenticity feature via unspecified vectors.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: ibm
Published:
Updated: 2024-08-06T09:27:20.266Z
Reserved: 2014-01-06T00:00:00
Link: CVE-2014-0888

No data.

Status : Deferred
Published: 2014-08-29T09:55:07.400
Modified: 2025-04-12T10:46:40.837
Link: CVE-2014-0888

No data.