We found results for “”
CVE-2024-35180
Good to know:
Date: May 21, 2024
OMERO.web provides a web based client and plugin infrastructure. There is currently no escaping or validation of the "callback" parameter that can be passed to various OMERO.web endpoints that have JSONP enabled. This vulnerability has been patched in version 5.26.0.
Language: Python
Severity Score
Related Resources (5)
Severity Score
Weakness Type (CWE)
Inclusion of Web Functionality from an Untrusted Source
CWE-830Top Fix
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | REQUIRED |
| Scope (S): | CHANGED |
| Confidentiality (C): | LOW |
| Integrity (I): | LOW |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


