6.1
CVE-2024-35180
- EPSS 0.42%
- Veröffentlicht 21.05.2024 13:15:08
- Zuletzt bearbeitet 29.09.2025 18:01:01
- Quelle security-advisories@github.com
- CVE-Watchlists
- Unerledigt
OMERO.web provides a web based client and plugin infrastructure. There is currently no escaping or validation of the `callback` parameter that can be passed to various OMERO.web endpoints that have JSONP enabled. This vulnerability has been patched in version 5.26.0.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Openmicroscopy ≫ Omero-web Version < 5.26.0
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.42% | 0.614 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security-advisories@github.com | 6.1 | 2.8 | 2.7 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
CWE-830 Inclusion of Web Functionality from an Untrusted Source
The product includes web functionality (such as a web widget) from another domain, which causes it to operate within the domain of the product, potentially granting total access and control of the product to the untrusted source.