{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T15:52:50.905","vulnerabilities":[{"cve":{"id":"CVE-2022-31054","sourceIdentifier":"security-advisories@github.com","published":"2022-06-13T20:15:07.897","lastModified":"2024-11-21T07:03:47.880","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Argo Events is an event-driven workflow automation framework for Kubernetes. Prior to version 1.7.1, several `HandleRoute` endpoints make use of the deprecated `ioutil.ReadAll()`. `ioutil.ReadAll()` reads all the data into memory. As such, an attacker who sends a large request to the Argo Events server will be able to crash it and cause denial of service. A patch for this vulnerability has been released in Argo Events version 1.7.1."},{"lang":"es","value":"Argo Events es un marco de automatización del flujo de trabajo basado en eventos para Kubernetes. En versiones 1.7.1, varios endpoints de \"HandleRoute\" hacían uso del obsoleto \"ioutil.ReadAll()\". \"ioutil.ReadAll()\" lee todos los datos en memoria. Por lo tanto, un atacante que envíe una petición grande al servidor de Argo Events podrá bloquearlo y causar una denegación de servicio. Ha sido publicado un parche para esta vulnerabilidad en versión 1.7.1 de Argo Events"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-400"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:argo_events_project:argo_events:*:*:*:*:*:*:*:*","versionEndExcluding":"1.7.1","matchCriteriaId":"A667F219-0024-441E-9D44-0336D782C472"}]}]}],"references":[{"url":"https://github.com/argoproj/argo-events/commit/eaabcb6d65022fc34a0cc9ea7f00681abd326b35","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/argoproj/argo-events/issues/1946","source":"security-advisories@github.com","tags":["Issue Tracking","Third Party Advisory"]},{"url":"https://github.com/argoproj/argo-events/pull/1966","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/argoproj/argo-events/security/advisories/GHSA-5q86-62xr-3r57","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/argoproj/argo-events/commit/eaabcb6d65022fc34a0cc9ea7f00681abd326b35","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/argoproj/argo-events/issues/1946","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Third Party Advisory"]},{"url":"https://github.com/argoproj/argo-events/pull/1966","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/argoproj/argo-events/security/advisories/GHSA-5q86-62xr-3r57","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}