automation-controller vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the automation-controller package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Resource Exhaustion

*
  • L
Information Exposure

*
  • M
Improper Null Termination

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Directory Traversal

*
  • L
Improper Access Control

*
  • L
Improper Access Control

*
  • L
Reachable Assertion

*
  • M
Resource Exhaustion

*
  • L
Improper Handling of Unexpected Data Type

*
  • L
HTTP Request Smuggling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • H
Out-of-bounds Write

*
  • M
Use After Free

*
  • M
Open Redirect

*
  • M
Open Redirect

*
  • L
Resource Exhaustion

*
  • M
Uncontrolled Recursion

*
  • M
Out-of-bounds Read

*
  • M
Origin Validation Error

*
  • M
Exposed Dangerous Method or Function

*
  • M
Buffer Over-read

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Directory Traversal

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Arbitrary Code Injection

*
  • M
Resource Exhaustion

*
  • M
Excessive Platform Resource Consumption within a Loop

*
  • M
Information Exposure

*
  • M
Always-Incorrect Control Flow Implementation

*
  • M
Cross-site Scripting (XSS)

*
  • M
Improper Check for Unusual or Exceptional Conditions

*
  • H
Arbitrary Code Injection

*
  • M
Information Exposure

*
  • M
Cross-site Scripting (XSS)

*
  • H
Server-Side Request Forgery (SSRF)

*
  • M
Improper Access Control

*
  • M
Improper Access Control

*
  • L
Incorrect Regular Expression

*
  • M
Improper Handling of Insufficient Permissions or Privileges

*
  • M
Improper Access Control

*
  • L
Directory Traversal

*
  • L
CVE-2024-45231

*
  • L
Inefficient Regular Expression Complexity

*
  • M
Server-Side Request Forgery (SSRF)

*
  • H
Insufficient Compartmentalization

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Open Redirect

*
  • M
Use of a Broken or Risky Cryptographic Algorithm

*
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Improper Access Control

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Improper Certificate Validation

*
  • H
SQL Injection

*
  • M
Inefficient Regular Expression Complexity

*
  • H
Allocation of Resources Without Limits or Throttling

*