Application Authenticity Bypass in IBM Worklight for Mobile Applications
CVE-2014-0888

Currently unrated

Key Information:

Vendor
IBM
Status
Vendor
CVE Published:
29 August 2014

Summary

A vulnerability in IBM Worklight Foundation versions 5.x and 6.x prior to 6.2.0.0 permits remote authenticated users to bypass the application-authenticity checks. This flaw can lead to unauthorized access and manipulation of application data, increasing the risk of security breaches. Organizations using affected versions should review their security measures and consider applying the necessary patches to mitigate this risk.

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.