ecs-service-connect-agent vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the ecs-service-connect-agent package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Use After Free

<0:v1.34.4.2-1.amzn2023
  • H
Out-of-bounds Read

<0:v1.34.4.2-1.amzn2023
  • H
Insufficient Session Expiration

<0:v1.34.4.2-1.amzn2023
  • H
Incorrect Calculation

<0:v1.34.4.2-1.amzn2023
  • H
Expired Pointer Dereference

<0:v1.34.4.2-1.amzn2023
  • H
NULL Pointer Dereference

<0:v1.34.4.2-1.amzn2023
  • H
Uncaught Exception

<0:v1.34.4.2-1.amzn2023
  • H
Improper Null Termination

<0:v1.34.4.2-1.amzn2023
  • H
Integer Overflow to Buffer Overflow

<0:v1.34.4.2-1.amzn2023
  • H
Out-of-bounds Read

<0:v1.34.4.2-1.amzn2023
  • H
Protection Mechanism Failure

<0:v1.34.4.2-1.amzn2023
  • H
Buffer Overflow

<0:v1.34.4.2-1.amzn2023
  • M
CVE-2025-30157

<0:v1.29.12.1-1.amzn2023
  • H
NULL Pointer Dereference

<0:v1.29.12.0-1.amzn2023
  • M
CVE-2024-45810

<0:v1.29.9.0-1.amzn2023
  • M
Out-of-bounds Read

<0:v1.29.9.0-1.amzn2023
  • M
Improper Encoding or Escaping of Output

<0:v1.29.9.0-1.amzn2023
  • M
Authorization Bypass Through User-Controlled Key

<0:v1.29.9.0-1.amzn2023
  • M
NULL Pointer Dereference

<0:v1.29.9.0-1.amzn2023
  • H
CVE-2024-38525

<0:v1.29.6.0-1.amzn2023
  • H
CVE-2024-30255

<0:v1.29.5.0-1.amzn2023
  • H
Resource Exhaustion

<0:v1.29.5.0-1.amzn2023
  • H
Resource Exhaustion

<0:v1.29.5.0-1.amzn2023
  • H
Resource Exhaustion

<0:v1.29.5.0-1.amzn2023
  • H
Resource Exhaustion

<0:v1.29.5.0-1.amzn2023
  • H
Reachable Assertion

<0:v1.29.5.0-1.amzn2023
  • H
Resource Exhaustion

<0:v1.29.5.0-1.amzn2023
  • H
Resource Exhaustion

<0:v1.29.5.0-1.amzn2023
  • H
HTTP Request Smuggling

<0:v1.29.5.0-1.amzn2023
  • H
NULL Pointer Dereference

<0:v1.27.3.0-1.amzn2023
  • H
Inefficient CPU Computation

<0:v1.27.3.0-1.amzn2023
  • H
Use After Free

<0:v1.27.3.0-1.amzn2023
  • H
Improper Input Validation

<0:v1.27.3.0-1.amzn2023
  • H
Uncaught Exception

<0:v1.27.3.0-1.amzn2023
  • H
Resource Exhaustion

<0:v1.27.2.0-1.amzn2023
  • H
Arbitrary Code Injection

<0:v1.27.2.0-1.amzn2023
  • H
External Control of File Name or Path

<0:v1.27.2.0-1.amzn2023
  • H
HTTP Request Smuggling

<0:v1.27.0.0-1.amzn2023
  • H
Use After Free

<0:v1.27.0.0-1.amzn2023
  • H
Use After Free

<0:v1.27.0.0-1.amzn2023
  • H
Use of Insufficiently Random Values

<0:v1.27.0.0-1.amzn2023
  • H
Use of Insufficiently Random Values

<0:v1.27.0.0-1.amzn2023
  • H
Improper Encoding or Escaping of Output

<0:v1.27.0.0-1.amzn2023
  • H
Resource Exhaustion

<0:v1.27.0.0-1.amzn2023
  • H
Out-of-bounds Write

<0:v1.27.0.0-1.amzn2023
  • H
Reliance on Undefined

<0:v1.27.0.0-1.amzn2023
  • H
Improper Encoding or Escaping of Output

<0:v1.26.4.0-1.amzn2023
  • H
HTTP Request Smuggling

<0:v1.26.4.0-1.amzn2023
  • H
Use After Free

<0:v1.26.4.0-1.amzn2023
  • H
Resource Exhaustion

<0:v1.26.4.0-1.amzn2023
  • H
Use After Free

<0:v1.26.4.0-1.amzn2023
  • H
CVE-2023-27488

<0:v1.25.4.0-1.amzn2023
  • H
Improper Input Validation

<0:v1.25.4.0-1.amzn2023
  • H
CVE-2023-27496

<0:v1.25.4.0-1.amzn2023
  • H
HTTP Request Smuggling

<0:v1.25.4.0-1.amzn2023
  • H
Improper Input Validation

<0:v1.25.4.0-1.amzn2023
  • H
Resource Exhaustion

<0:v1.25.4.0-1.amzn2023