automation-controller

Direct Vulnerabilities

Known vulnerabilities in the automation-controller package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
Allocation of Resources Without Limits or Throttling

*
  • L
Exposure of System Data to an Unauthorized Control Sphere

*
  • M
HTTP Request Smuggling

*
  • M
CRLF Injection

*
  • M
Improper Validation of Syntactic Correctness of Input

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • L
Improper Validation of Syntactic Correctness of Input

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • H
Arbitrary Code Injection

*
  • L
Improper Certificate Validation

*
  • M
Inefficient Regular Expression Complexity

*
  • H
Inefficient Regular Expression Complexity

*
  • M
Creation of Temporary File in Directory with Incorrect Permissions

*
  • M
Unchecked Input for Loop Condition

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Buffer Access with Incorrect Length Value

*
  • M
Cross-site Scripting (XSS)

*
  • H
SQL Injection

*
  • H
SQL Injection

*
  • L
Time-of-check Time-of-use (TOCTOU)

*
  • M
Cross-site Scripting (XSS)

*
  • L
Directory Traversal

*
  • M
Expression Language Injection

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • H
SQL Injection

*
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • H
Buffer Overflow

*
  • M
Not Failing Securely ('Failing Open')

*
  • H
Reachable Assertion

*
  • L
Server-Side Request Forgery (SSRF)

*
  • H
Improper Verification of Cryptographic Signature

*
  • L
Server-Side Request Forgery (SSRF)

*
  • H
Improper Validation of Integrity Check Value

*
  • M
Open Redirect

*
  • M
Improper Handling of Additional Special Element

*
  • H
Improper Handling of Highly Compressed Data (Data Amplification)

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
SQL Injection

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Directory Traversal

*
  • L
Reachable Assertion

*
  • L
Improper Handling of Unexpected Data Type

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Use After Free

*
  • L
Inefficient Regular Expression Complexity

*
  • M
Origin Validation Error

*
  • M
Exposed Dangerous Method or Function

*
  • M
Directory Traversal

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Arbitrary Code Injection

*
  • M
Resource Exhaustion

*
  • M
Excessive Platform Resource Consumption within a Loop

*
  • M
Information Exposure

*
  • M
Always-Incorrect Control Flow Implementation

*
  • M
Cross-site Scripting (XSS)

*
  • M
Improper Check for Unusual or Exceptional Conditions

*
  • H
Arbitrary Code Injection

*
  • M
Information Exposure

*
  • M
Cross-site Scripting (XSS)

*
  • H
Server-Side Request Forgery (SSRF)

*
  • M
Improper Access Control

*
  • M
Path Equivalence

*
  • L
Directory Traversal

*
  • L
CVE-2024-45231

*
  • L
Inefficient Regular Expression Complexity

*
  • M
Server-Side Request Forgery (SSRF)

*
  • H
Insufficient Compartmentalization

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Open Redirect

*
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Cross-site Scripting (XSS)

*
  • M
Improper Certificate Validation

*
  • H
SQL Injection

*
  • H
Allocation of Resources Without Limits or Throttling

*