Lucene search

K
OctopusOctopus Deploy

7 matches found

cve
cve
added 2022/06/13 12:15 a.m.41 views

CVE-2022-2013

In Octopus Server after version 2022.1.1495 and before 2022.1.2647 if private spaces were enabled via the experimental feature flag all new users would have access to the Script Console within their private space.

7.5CVSS7.5AI score0.00322EPSS
cve
cve
added 2018/04/30 4:29 a.m.40 views

CVE-2018-10550

In Octopus Deploy before 2018.4.7, target and tenant tag variable scopes were not checked against the list of tenants the user has access to.

7.5CVSS7.5AI score0.00234EPSS
cve
cve
added 2017/10/19 8:29 a.m.38 views

CVE-2017-15609

Octopus before 3.17.7 allows attackers to obtain sensitive cleartext information by reading a variable JSON file in certain situations involving Offline Drop Targets.

7.5CVSS7.2AI score0.00117EPSS
cve
cve
added 2020/09/09 4:15 p.m.37 views

CVE-2020-24566

In Octopus Deploy 2020.3.x before 2020.3.4 and 2020.4.x before 2020.4.1, if an authenticated user creates a deployment or runbook process using Azure steps and sets the step's execution location to run on the server/worker, then (under certain circumstances) the account password is exposed in clear...

7.5CVSS7.5AI score0.01457EPSS
cve
cve
added 2021/10/07 1:15 a.m.36 views

CVE-2021-26556

When Octopus Server is installed using a custom folder location, folder ACLs are not set correctly and could lead to an unprivileged user using DLL side-loading to gain privileged access.

7.8CVSS7.6AI score0.00058EPSS
cve
cve
added 2020/10/12 5:15 p.m.35 views

CVE-2020-25825

In Octopus Deploy 3.1.0 to 2020.4.0, certain scripts can reveal sensitive information to the user in the task logs.

7.5CVSS7.3AI score0.00378EPSS
cve
cve
added 2020/10/22 5:15 p.m.29 views

CVE-2020-27155

An issue was discovered in Octopus Deploy through 2020.4.4. If enabled, the websocket endpoint may allow an untrusted tentacle host to present itself as a trusted one.

7.5CVSS7.4AI score0.00383EPSS