CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:S/C:N/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
33.0%
IBM Worklight Foundation 5.x and 6.x before 6.2.0.0, as used in Worklight and Mobile Foundation, allows remote authenticated users to bypass the application-authenticity feature via unspecified vectors.
Vendor | Product | Version | CPE |
---|---|---|---|
ibm | worklight | 5.0.0.0 | cpe:2.3:a:ibm:worklight:5.0.0.0:*:*:*:consumer:*:*:* |
ibm | worklight | 5.0.0.0 | cpe:2.3:a:ibm:worklight:5.0.0.0:*:*:*:enterprise:*:*:* |
ibm | worklight | 5.0.0.1 | cpe:2.3:a:ibm:worklight:5.0.0.1:*:*:*:consumer:*:*:* |
ibm | worklight | 5.0.0.1 | cpe:2.3:a:ibm:worklight:5.0.0.1:*:*:*:enterprise:*:*:* |
ibm | worklight | 5.0.0.2 | cpe:2.3:a:ibm:worklight:5.0.0.2:*:*:*:consumer:*:*:* |
ibm | worklight | 5.0.0.2 | cpe:2.3:a:ibm:worklight:5.0.0.2:*:*:*:enterprise:*:*:* |
ibm | worklight | 5.0.0.3 | cpe:2.3:a:ibm:worklight:5.0.0.3:*:*:*:consumer:*:*:* |
ibm | worklight | 5.0.0.3 | cpe:2.3:a:ibm:worklight:5.0.0.3:*:*:*:enterprise:*:*:* |
ibm | worklight | 5.0.5.0 | cpe:2.3:a:ibm:worklight:5.0.5.0:*:*:*:consumer:*:*:* |
ibm | worklight | 5.0.5.0 | cpe:2.3:a:ibm:worklight:5.0.5.0:*:*:*:enterprise:*:*:* |