Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2014-0888

Опубликовано: 29 авг. 2014
Источник: nvd
CVSS2: 4.9
EPSS Низкий

Описание

IBM Worklight Foundation 5.x and 6.x before 6.2.0.0, as used in Worklight and Mobile Foundation, allows remote authenticated users to bypass the application-authenticity feature via unspecified vectors.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:ibm:worklight:5.0.0.0:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:5.0.0.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:5.0.0.1:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:5.0.0.1:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:5.0.0.2:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:5.0.0.2:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:5.0.0.3:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:5.0.0.3:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:5.0.5.0:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:5.0.5.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:5.0.5.1:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:5.0.5.1:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:5.0.6.0:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:5.0.6.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:5.0.6.1:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:5.0.6.1:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:5.0.6.2:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:5.0.6.2:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:6.0.0.0:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:6.0.0.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:6.0.0.1:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:6.0.0.1:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:6.0.0.2:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:6.0.0.2:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:6.1.0.0:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:6.1.0.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:ibm:worklight:6.1.0.1:*:*:*:consumer:*:*:*
cpe:2.3:a:ibm:worklight:6.1.0.1:*:*:*:enterprise:*:*:*
Конфигурация 2

Одно из

cpe:2.3:a:ibm:mobile_foundation:5.0.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:5.0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:5.0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:5.0.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:5.0.5.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:5.0.5.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:5.0.6.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:5.0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:5.0.6.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:6.0.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:6.0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:6.0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:6.1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:mobile_foundation:6.1.0.1:*:*:*:*:*:*:*

EPSS

Процентиль: 39%
0.0017
Низкий

4.9 Medium

CVSS2

Дефекты

CWE-264

Связанные уязвимости

github
больше 3 лет назад

IBM Worklight Foundation 5.x and 6.x before 6.2.0.0, as used in Worklight and Mobile Foundation, allows remote authenticated users to bypass the application-authenticity feature via unspecified vectors.

EPSS

Процентиль: 39%
0.0017
Низкий

4.9 Medium

CVSS2

Дефекты

CWE-264