automation-gateway

Direct Vulnerabilities

Known vulnerabilities in the automation-gateway package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Cross-site Scripting (XSS)

*
  • M
Improperly Controlled Modification of Dynamically-Determined Object Attributes

*
  • L
Out-of-bounds Write

*
  • M
Improper Validation of Unsafe Equivalence in Input

*
  • H
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Unchecked Input for Loop Condition

*
  • M
Improperly Controlled Modification of Dynamically-Determined Object Attributes

*
  • H
Improper Validation of Unsafe Equivalence in Input

*
  • M
Improper Handling of Highly Compressed Data (Data Amplification)

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • H
External Control of Assumed-Immutable Web Parameter

*
  • H
Insufficient Granularity of Access Control

*
  • M
Directory Traversal

*
  • H
Arbitrary Code Injection

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Inefficient Regular Expression Complexity

*
  • H
Unchecked Input for Loop Condition

*
  • H
Improper Verification of Cryptographic Signature

*
  • H
Inefficient Regular Expression Complexity

*
  • H
Improper Verification of Cryptographic Signature

*
  • H
Improper Certificate Validation

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Executable Regular Expression Error

*
  • M
Unchecked Input for Loop Condition

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • H
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

*
  • L
Server-Side Request Forgery (SSRF)

*
  • M
Inefficient Regular Expression Complexity

*
  • L
Server-Side Request Forgery (SSRF)

*
  • M
Open Redirect

*
  • H
Inefficient Regular Expression Complexity

*
  • H
Directory Traversal

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Directory Traversal

*
  • M
Use of Insufficiently Random Values

*
  • L
Improper Handling of Unexpected Data Type

*
  • L
Inefficient Regular Expression Complexity

*
  • M
Origin Validation Error

*
  • M
Exposed Dangerous Method or Function

*
  • M
Directory Traversal

*
  • L
Arbitrary Code Injection

*
  • M
Resource Exhaustion

*
  • M
Always-Incorrect Control Flow Implementation

*
  • M
Information Exposure

*
  • M
Improper Access Control

*
  • M
Path Equivalence

*