Lucene search

K
OctopusOctopus Deploy

7 matches found

CVE
CVE
added 2020/03/19 3:15 p.m.43 views

CVE-2020-10678

In Octopus Deploy before 2020.1.5, for customers running on-premises Active Directory linked to their Octopus server, an authenticated user can leverage a bug to escalate privileges.

8.8CVSS8.6AI score0.00768EPSS
CVE
CVE
added 2020/09/09 4:15 p.m.37 views

CVE-2020-24566

In Octopus Deploy 2020.3.x before 2020.3.4 and 2020.4.x before 2020.4.1, if an authenticated user creates a deployment or runbook process using Azure steps and sets the step's execution location to run on the server/worker, then (under certain circumstances) the account password is exposed in clear...

7.5CVSS7.5AI score0.01457EPSS
CVE
CVE
added 2020/10/12 5:15 p.m.35 views

CVE-2020-25825

In Octopus Deploy 3.1.0 to 2020.4.0, certain scripts can reveal sensitive information to the user in the task logs.

7.5CVSS7.3AI score0.00378EPSS
CVE
CVE
added 2020/10/26 6:15 p.m.35 views

CVE-2020-26161

In Octopus Deploy through 2020.4.2, an attacker could redirect users to an external site via a modified HTTP Host header.

6.1CVSS6.1AI score0.0023EPSS
CVE
CVE
added 2020/04/28 7:15 a.m.30 views

CVE-2020-12286

In Octopus Deploy before 2019.12.9 and 2020 before 2020.1.12, the TaskView permission is not scoped to any dimension. For example, a scoped user who is scoped to only one tenant can view server tasks scoped to any other tenant.

4.3CVSS4.6AI score0.0039EPSS
CVE
CVE
added 2020/06/19 4:15 p.m.30 views

CVE-2020-14470

In Octopus Deploy 2018.8.0 through 2019.x before 2019.12.2, an authenticated user with could trigger a deployment that leaks the Helm Chart repository password.

6.5CVSS6.4AI score0.00543EPSS
CVE
CVE
added 2020/10/22 5:15 p.m.29 views

CVE-2020-27155

An issue was discovered in Octopus Deploy through 2020.4.4. If enabled, the websocket endpoint may allow an untrusted tentacle host to present itself as a trusted one.

7.5CVSS7.4AI score0.00383EPSS