Security Advisories for github.com/argoproj/argo-workflows/v3 in go
High
19 days ago
Argo Workflow may expose artifact repository credentials
go
github.com/argoproj/argo-workflows/v3
Moderate
11 months ago
Access to Archived Argo Workflows with Fake Token in `client` mode
go
github.com/argoproj/argo-workflows/v3
Moderate
about 1 year ago
Argo Workflows Controller: Denial of Service via malicious daemon Workflows
go
github.com/argoproj/argo-workflows/v3
High
over 3 years ago
Malicious HTML+XHR Artifact Privilege Escalation in Argo Workflows
go
github.com/argoproj/argo-workflows/v3
Low
about 4 years ago
Potential privilege escalation on Kubernetes >= v1.19 when the Argo Sever is run with `--auth-mode=client`
go
github.com/argoproj/argo-workflows/v3
Moderate
about 4 years ago
Argo Server TLS requests could be forged by attacker with network access
go
github.com/argoproj/argo-workflows/v3
Moderate
about 4 years ago
Workflow re-write vulnerability using input parameter
go
github.com/argoproj/argo-workflows/v3