Lucene search

K
OctopusOctopus Server

21 matches found

CVE
CVE
added 2022/10/13 5:15 a.m.1752 views

CVE-2022-2828

In affected versions of Octopus Server it is possible to reveal information about teams via the API due to an Insecure Direct Object Reference (IDOR) vulnerability

6.5CVSS6.3AI score0.00231EPSS
CVE
CVE
added 2022/02/07 3:15 a.m.66 views

CVE-2022-23184

In affected Octopus Server versions when the server HTTP and HTTPS bindings are configured to localhost, Octopus Server will allow open redirects.

6.1CVSS6.2AI score0.00185EPSS
CVE
CVE
added 2022/05/19 5:15 a.m.59 views

CVE-2022-1670

When generating a user invitation code in Octopus Server, the validity of this code can be set for a specific number of users. It was possible to bypass this restriction of validity to create extra user accounts above the initial number of invited users.

7.5CVSS7.5AI score0.00241EPSS
CVE
CVE
added 2022/08/19 9:15 a.m.55 views

CVE-2022-2074

In affected versions of Octopus Deploy it is possible to perform a Regex Denial of Service using the Variable Project Template.

7.5CVSS7.4AI score0.00263EPSS
CVE
CVE
added 2022/08/19 9:15 a.m.52 views

CVE-2022-2049

In affected versions of Octopus Deploy it is possible to perform a Regex Denial of Service via the package upload function.

7.5CVSS7.5AI score0.00263EPSS
CVE
CVE
added 2022/08/19 8:15 a.m.49 views

CVE-2022-1901

In affected versions of Octopus Deploy it is possible to unmask sensitive variables by using variable preview.

5.3CVSS5.2AI score0.00265EPSS
CVE
CVE
added 2022/07/15 8:15 a.m.49 views

CVE-2022-29890

In affected versions of Octopus Server the help sidebar can be customized to include a Cross-Site Scripting payload in the support link.

6.1CVSS6AI score0.00542EPSS
CVE
CVE
added 2022/07/15 8:15 a.m.48 views

CVE-2022-1881

In affected versions of Octopus Server an Insecure Direct Object Reference vulnerability exists where it is possible for a user to download Project Exports from a Project they do not have permissions to access. This vulnerability only impacts projects within the same Space.

5.3CVSS5.2AI score0.00153EPSS
CVE
CVE
added 2022/09/30 4:15 a.m.48 views

CVE-2022-2778

In affected versions of Octopus Deploy it is possible to bypass rate limiting on login using null bytes.

9.8CVSS9.3AI score0.00055EPSS
CVE
CVE
added 2022/08/19 9:15 a.m.46 views

CVE-2022-2075

In affected versions of Octopus Deploy it is possible to perform a Regex Denial of Service targeting the build information request validation.

7.5CVSS7.3AI score0.00193EPSS
CVE
CVE
added 2022/07/19 7:15 a.m.46 views

CVE-2022-30532

In affected versions of Octopus Deploy, there is no logging of changes to artifacts within Octopus Deploy.

5.3CVSS5.3AI score0.00249EPSS
CVE
CVE
added 2022/10/27 10:15 a.m.45 views

CVE-2022-2508

In affected versions of Octopus Server it is possible to reveal the existence of resources in a space that the user does not have access to due to verbose error messaging.

5.3CVSS5.2AI score0.00275EPSS
CVE
CVE
added 2022/10/12 7:15 a.m.43 views

CVE-2022-2720

In affected versions of Octopus Server it was identified that when a sensitive value is a substring of another value, sensitive value masking will only partially work.

5.3CVSS5.3AI score0.00275EPSS
CVE
CVE
added 2022/11/25 5:15 a.m.43 views

CVE-2022-2721

In affected versions of Octopus Server it is possible for target discovery to print certain values marked as sensitive to log files in plaint-text in when verbose logging is enabled.

7.5CVSS7.4AI score0.00175EPSS
CVE
CVE
added 2022/10/06 6:15 p.m.42 views

CVE-2022-2783

In affected versions of Octopus Server it was identified that a session cookie could be used as the CSRF token

5.3CVSS5.3AI score0.00144EPSS
CVE
CVE
added 2022/10/14 7:15 a.m.41 views

CVE-2022-2780

In affected versions of Octopus Server it is possible to use the Git Connectivity test function on the VCS project to initiate an SMB request resulting in the potential for an NTLM relay attack.

8.1CVSS8AI score0.0027EPSS
CVE
CVE
added 2022/09/09 8:15 a.m.38 views

CVE-2022-2528

In affected versions of Octopus Deploy it is possible to upload a package to built-in feed with insufficient permissions after re-indexing packages.

6.5CVSS6.5AI score0.00103EPSS
CVE
CVE
added 2022/10/27 10:15 a.m.37 views

CVE-2022-2782

In affected versions of Octopus Server it is possible for a session token to be valid indefinitely due to improper validation of the session token parameters.

9.1CVSS9.1AI score0.00157EPSS
CVE
CVE
added 2022/11/01 2:15 a.m.36 views

CVE-2022-2572

In affected versions of Octopus Server where access is managed by an external authentication provider, it was possible that the API key/keys of a disabled/deleted user were still valid after the access was revoked.

9.8CVSS9.5AI score0.00196EPSS
CVE
CVE
added 2022/09/28 12:15 p.m.34 views

CVE-2022-2760

In affected versions of Octopus Deploy it is possible to reveal the Space ID of spaces that the user does not have access to view in an error message when a resource is part of another Space.

4.3CVSS4.5AI score0.00305EPSS
CVE
CVE
added 2022/10/06 6:15 p.m.30 views

CVE-2022-2781

In affected versions of Octopus Server it was identified that the same encryption process was used for both encrypting session cookies and variables.

5.3CVSS5.4AI score0.00116EPSS