IBM Worklight Foundation 5.x and 6.x before 6.2.0.0, as used in Worklight and Mobile Foundation, allows remote authenticated users to bypass the application-authenticity feature via unspecified vectors.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Worklight | Ibm | 5.0.0.0 (including) | 5.0.0.0 (including) |
Worklight | Ibm | 5.0.0.1 (including) | 5.0.0.1 (including) |
Worklight | Ibm | 5.0.0.2 (including) | 5.0.0.2 (including) |
Worklight | Ibm | 5.0.0.3 (including) | 5.0.0.3 (including) |
Worklight | Ibm | 5.0.5.0 (including) | 5.0.5.0 (including) |
Worklight | Ibm | 5.0.5.1 (including) | 5.0.5.1 (including) |
Worklight | Ibm | 5.0.6.0 (including) | 5.0.6.0 (including) |
Worklight | Ibm | 5.0.6.1 (including) | 5.0.6.1 (including) |
Worklight | Ibm | 5.0.6.2 (including) | 5.0.6.2 (including) |
Worklight | Ibm | 6.0.0.0 (including) | 6.0.0.0 (including) |
Worklight | Ibm | 6.0.0.1 (including) | 6.0.0.1 (including) |
Worklight | Ibm | 6.0.0.2 (including) | 6.0.0.2 (including) |
Worklight | Ibm | 6.1.0.0 (including) | 6.1.0.0 (including) |
Worklight | Ibm | 6.1.0.1 (including) | 6.1.0.1 (including) |