Vulnerability Details CVE-2014-0888
IBM Worklight Foundation 5.x and 6.x before 6.2.0.0, as used in Worklight and Mobile Foundation, allows remote authenticated users to bypass the application-authenticity feature via unspecified vectors.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 38.9%
CVSS Severity
CVSS v2 Score 4.9
Products affected by CVE-2014-0888
-
cpe:2.3:a:ibm:mobile_foundation:5.0.0.0
-
cpe:2.3:a:ibm:mobile_foundation:5.0.0.1
-
cpe:2.3:a:ibm:mobile_foundation:5.0.0.2
-
cpe:2.3:a:ibm:mobile_foundation:5.0.0.3
-
cpe:2.3:a:ibm:mobile_foundation:5.0.5.0
-
cpe:2.3:a:ibm:mobile_foundation:5.0.5.1
-
cpe:2.3:a:ibm:mobile_foundation:5.0.6.0
-
cpe:2.3:a:ibm:mobile_foundation:5.0.6.1
-
cpe:2.3:a:ibm:mobile_foundation:5.0.6.2
-
cpe:2.3:a:ibm:mobile_foundation:6.0.0.0
-
cpe:2.3:a:ibm:mobile_foundation:6.0.0.1
-
cpe:2.3:a:ibm:mobile_foundation:6.0.0.2
-
cpe:2.3:a:ibm:mobile_foundation:6.1.0.0
-
cpe:2.3:a:ibm:mobile_foundation:6.1.0.1
-
cpe:2.3:a:ibm:worklight:5.0.0.0
-
cpe:2.3:a:ibm:worklight:5.0.0.1
-
cpe:2.3:a:ibm:worklight:5.0.0.2
-
cpe:2.3:a:ibm:worklight:5.0.0.3
-
cpe:2.3:a:ibm:worklight:5.0.5.0
-
cpe:2.3:a:ibm:worklight:5.0.5.1
-
cpe:2.3:a:ibm:worklight:5.0.6.0
-
cpe:2.3:a:ibm:worklight:5.0.6.1
-
cpe:2.3:a:ibm:worklight:5.0.6.2
-
cpe:2.3:a:ibm:worklight:6.0.0.0
-
cpe:2.3:a:ibm:worklight:6.0.0.1
-
cpe:2.3:a:ibm:worklight:6.0.0.2
-
cpe:2.3:a:ibm:worklight:6.1.0.0
-
cpe:2.3:a:ibm:worklight:6.1.0.1