RSS   Vulnerabilities for 'Omero'   RSS

2020-06-17
 
CVE-2020-6752

CWE-200
 

 
In OMERO before 5.6.1, group owners can access members' data in other groups.

 
 
CVE-2019-16245

CWE-200
 

 
OMERO before 5.6.1 makes the details of each user available to all users.

 
2019-03-31
 
CVE-2014-7198

CWE-352
 

 
OMERO before 5.0.6 has multiple CSRF vulnerabilities because the framework for OMERO's web interface lacks CSRF protection.

 
2018-08-20
 
CVE-2018-1000635

 

 
The Open Microscopy Environment OMERO.server version 5.4.0 to 5.4.6 contains a Information Exposure Through Sent Data vulnerability in OMERO.server that can result in an Attacker gaining full administrative access to server and may be able to disable it. This vulnerability appears to have been fixed in 5.4.7.

 
 
CVE-2018-1000634

CWE-269
 

 
The Open Microscopy Environment OMERO.server version 5.4.0 to 5.4.6 contains an Improper Access Control vulnerability in User management that can result in administrative user with privilege restrictions logging in as a more powerful administrator. This attack appear to be exploitable via Use user administration privilege to set the password of a more powerful administrator. This vulnerability appears to have been fixed in 5.4.7.

 
 
CVE-2018-1000633

 

 
The Open Microscopy Environment OMERO.web version prior to 5.4.7 contains an Information Exposure Through Log Files vulnerability in the login form and change password form that can result in User's password being revealed. Attacker can log in as that user. This attack appear to be exploitable via an attacker reading the web server log. This vulnerability appears to have been fixed in 5.4.7.

 
2018-01-02
 
CVE-2017-1000438

CWE-noinfo
 

 
In OMERO 5.3.3 or earlier a user could create an OriginalFile and adjust its path such that it now points to another user's file on the underlying filesystem, then manipulate the user's data.

 

 >>> Vendor: Openmicroscopy 5 Products
Omero
Omero.server
Omero.web
Omero-figure
Omero-web


Copyright 2024, cxsecurity.com

 

Back to Top