Filtered by vendor Octopus
Subscribe
Total
83 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-2346 | 1 Octopus | 1 Octopus Server | 2023-08-07 | N/A | 4.3 MEDIUM |
In affected versions of Octopus Deploy it is possible for a low privileged guest user to interact with extension endpoints. | |||||
CVE-2022-2416 | 1 Octopus | 1 Octopus Server | 2023-08-04 | N/A | 4.3 MEDIUM |
In affected versions of Octopus Deploy it is possible for a low privileged guest user to craft a request that allows enumeration/recon of an environment. | |||||
CVE-2022-4870 | 1 Octopus | 1 Octopus Server | 2023-05-25 | N/A | 5.3 MEDIUM |
In affected versions of Octopus Deploy it is possible to discover network details via error message | |||||
CVE-2022-4008 | 1 Octopus | 1 Octopus Server | 2023-05-17 | N/A | 5.5 MEDIUM |
In affected versions of Octopus Deploy it is possible to upload a zipbomb file as a task which results in Denial of Service | |||||
CVE-2022-2507 | 1 Octopus | 1 Octopus Server | 2023-04-29 | N/A | 5.3 MEDIUM |
In affected versions of Octopus Deploy it is possible to render user supplied input into the webpage | |||||
CVE-2022-3614 | 1 Octopus | 1 Octopus Server | 2023-03-23 | N/A | 6.1 MEDIUM |
In affected versions of Octopus Deploy users of certain browsers using AD to sign-in to Octopus Server were able to bypass authentication checks and be redirected to the configured redirect url without any validation. | |||||
CVE-2022-2883 | 1 Octopus | 1 Octopus Server | 2023-03-03 | N/A | 7.5 HIGH |
In affected versions of Octopus Deploy it is possible to upload a zipbomb file as a task which results in Denial of Service | |||||
CVE-2022-4898 | 1 Octopus | 1 Octopus Server | 2023-02-21 | N/A | 5.4 MEDIUM |
In affected versions of Octopus Server the help sidebar can be customized to include a Cross-Site Scripting payload in the support link. This was initially resolved in advisory 2022-07 however it was identified that the fix could be bypassed in certain circumstances. A different approach was taken to prevent the possibility of the support link being susceptible to XSS | |||||
CVE-2022-2721 | 1 Octopus | 1 Octopus Server | 2022-11-29 | N/A | 7.5 HIGH |
In affected versions of Octopus Server it is possible for target discovery to print certain values marked as sensitive to log files in plaint-text in when verbose logging is enabled. | |||||
CVE-2022-2572 | 1 Octopus | 1 Octopus Server | 2022-11-01 | N/A | 9.8 CRITICAL |
In affected versions of Octopus Server where access is managed by an external authentication provider, it was possible that the API key/keys of a disabled/deleted user were still valid after the access was revoked. | |||||
CVE-2022-2782 | 1 Octopus | 1 Octopus Server | 2022-10-28 | N/A | 9.1 CRITICAL |
In affected versions of Octopus Server it is possible for a session token to be valid indefinitely due to improper validation of the session token parameters. | |||||
CVE-2022-2508 | 1 Octopus | 1 Octopus Server | 2022-10-28 | N/A | 5.3 MEDIUM |
In affected versions of Octopus Server it is possible to reveal the existence of resources in a space that the user does not have access to due to verbose error messaging. | |||||
CVE-2022-2780 | 1 Octopus | 1 Octopus Server | 2022-10-19 | N/A | 8.1 HIGH |
In affected versions of Octopus Server it is possible to use the Git Connectivity test function on the VCS project to initiate an SMB request resulting in the potential for an NTLM relay attack. | |||||
CVE-2022-2720 | 1 Octopus | 1 Octopus Server | 2022-10-14 | N/A | 5.3 MEDIUM |
In affected versions of Octopus Server it was identified that when a sensitive value is a substring of another value, sensitive value masking will only partially work. | |||||
CVE-2022-2828 | 1 Octopus | 1 Octopus Server | 2022-10-14 | N/A | 6.5 MEDIUM |
In affected versions of Octopus Server it is possible to reveal information about teams via the API due to an Insecure Direct Object Reference (IDOR) vulnerability | |||||
CVE-2022-2760 | 1 Octopus | 1 Octopus Server | 2022-09-29 | N/A | 4.3 MEDIUM |
In affected versions of Octopus Deploy it is possible to reveal the Space ID of spaces that the user does not have access to view in an error message when a resource is part of another Space. | |||||
CVE-2022-2528 | 1 Octopus | 1 Octopus Server | 2022-09-15 | N/A | 6.5 MEDIUM |
In affected versions of Octopus Deploy it is possible to upload a package to built-in feed with insufficient permissions after re-indexing packages. | |||||
CVE-2022-2075 | 3 Linux, Microsoft, Octopus | 3 Linux Kernel, Windows, Octopus Server | 2022-08-20 | N/A | 7.5 HIGH |
In affected versions of Octopus Deploy it is possible to perform a Regex Denial of Service targeting the build information request validation. | |||||
CVE-2022-2074 | 3 Linux, Microsoft, Octopus | 3 Linux Kernel, Windows, Octopus Server | 2022-08-20 | N/A | 7.5 HIGH |
In affected versions of Octopus Deploy it is possible to perform a Regex Denial of Service using the Variable Project Template. | |||||
CVE-2022-2049 | 3 Linux, Microsoft, Octopus | 3 Linux Kernel, Windows, Octopus Server | 2022-08-20 | N/A | 7.5 HIGH |
In affected versions of Octopus Deploy it is possible to perform a Regex Denial of Service via the package upload function. |