Latest version: v1.51
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
GRISM Configuration python code, described in ISR 2017-01: A More Generalized Coordinate Transformation Approach for Grisms, Pirzkal & Ryan 2017 http://www.stsci.edu/hst/wfc3/documents/ISRs/WFC3-2017-01.pdf
No known vulnerabilities found
Has known vulnerabilities