Описание
IBM Worklight Foundation 5.x and 6.x before 6.2.0.0, as used in Worklight and Mobile Foundation, allows remote authenticated users to bypass the application-authenticity feature via unspecified vectors.
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:ibm:worklight:5.0.0.0:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:5.0.0.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:5.0.0.1:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:5.0.0.1:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:5.0.0.2:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:5.0.0.2:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:5.0.0.3:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:5.0.0.3:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:5.0.5.0:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:5.0.5.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:5.0.5.1:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:5.0.5.1:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:5.0.6.0:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:5.0.6.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:5.0.6.1:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:5.0.6.1:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:5.0.6.2:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:5.0.6.2:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:6.0.0.0:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:6.0.0.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:6.0.0.1:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:6.0.0.1:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:6.0.0.2:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:6.0.0.2:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:6.1.0.0:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:6.1.0.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:6.1.0.1:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:6.1.0.1:*:*:*:enterprise:*:*:*
Конфигурация 2
Одно из
cpe:2.3:a:ibm:mobile_foundation:5.0.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:5.0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:5.0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:5.0.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:5.0.5.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:5.0.5.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:5.0.6.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:5.0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:5.0.6.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:6.0.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:6.0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:6.0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:6.1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:6.1.0.1:*:*:*:*:*:*:*
EPSS
Процентиль: 39%
0.0017
Низкий
4.9 Medium
CVSS2
Дефекты
CWE-264
Связанные уязвимости
github
больше 3 лет назад
IBM Worklight Foundation 5.x and 6.x before 6.2.0.0, as used in Worklight and Mobile Foundation, allows remote authenticated users to bypass the application-authenticity feature via unspecified vectors.
EPSS
Процентиль: 39%
0.0017
Низкий
4.9 Medium
CVSS2
Дефекты
CWE-264