automation-controller.src vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the automation-controller.src package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Improper Validation of Integrity Check Value

*
  • L
Server-Side Request Forgery (SSRF)

*
  • L
Server-Side Request Forgery (SSRF)

*
  • M
Improper Null Termination

*
  • M
LDAP Injection

*
  • H
Out-of-bounds Write

*
  • L
Information Exposure

*
  • H
SQL Injection

*
  • H
SQL Injection

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Handling of Additional Special Element

*
  • H
SQL Injection

*
  • M
Path Equivalence

*
  • L
Directory Traversal

*
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Uncontrolled Recursion

*
  • H
Directory Traversal

*
  • M
Buffer Over-read

*
  • M
Improper Handling of Insufficient Permissions or Privileges

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Open Redirect

*
  • M
Open Redirect

*
  • M
Inefficient Regular Expression Complexity

*
  • L
Directory Traversal

*
  • L
Directory Traversal

*
  • M
Information Exposure

*
  • M
Excessive Platform Resource Consumption within a Loop

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • L
Inefficient Regular Expression Complexity

*
  • M
Directory Traversal

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
Open Redirect

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • L
Logging of Excessive Data

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
HTTP Request Smuggling

*
  • L
HTTP Request Smuggling

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Directory Traversal

*
  • H
Improper Handling of Highly Compressed Data (Data Amplification)

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • L
Resource Exhaustion

*
  • L
Incorrect Regular Expression

*
  • L
Information Exposure

*
  • L
Directory Traversal

*
  • M
Server-Side Request Forgery (SSRF)

*
  • L
Arbitrary Code Injection

*
  • M
Open Redirect

*
  • M
Cross-site Scripting (XSS)

*
  • M
Incomplete Blacklist

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Resource Exhaustion

*
  • M
Cross-site Scripting (XSS)

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • H
Server-Side Request Forgery (SSRF)

*
  • H
Arbitrary Code Injection

*