Filtered by vendor Octopus
Subscribe
Total
98 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-2782 | 1 Octopus | 1 Octopus Server | 2025-05-07 | N/A | 9.1 CRITICAL |
In affected versions of Octopus Server it is possible for a session token to be valid indefinitely due to improper validation of the session token parameters. | |||||
CVE-2022-2508 | 1 Octopus | 1 Octopus Server | 2025-05-07 | N/A | 5.3 MEDIUM |
In affected versions of Octopus Server it is possible to reveal the existence of resources in a space that the user does not have access to due to verbose error messaging. | |||||
CVE-2022-2572 | 1 Octopus | 1 Octopus Server | 2025-05-06 | N/A | 9.8 CRITICAL |
In affected versions of Octopus Server where access is managed by an external authentication provider, it was possible that the API key/keys of a disabled/deleted user were still valid after the access was revoked. | |||||
CVE-2022-2721 | 1 Octopus | 1 Octopus Server | 2025-04-25 | N/A | 7.5 HIGH |
In affected versions of Octopus Server it is possible for target discovery to print certain values marked as sensitive to log files in plaint-text in when verbose logging is enabled. | |||||
CVE-2022-3460 | 1 Octopus | 1 Octopus Server | 2025-04-10 | N/A | 7.5 HIGH |
In affected versions of Octopus Deploy it is possible for certain types of sensitive variables to inadvertently become unmasked when viewed in variable preview. | |||||
CVE-2022-3614 | 1 Octopus | 1 Octopus Server | 2025-04-10 | N/A | 6.1 MEDIUM |
In affected versions of Octopus Deploy users of certain browsers using AD to sign-in to Octopus Server were able to bypass authentication checks and be redirected to the configured redirect url without any validation. | |||||
CVE-2022-4898 | 1 Octopus | 1 Octopus Server | 2025-03-27 | N/A | 5.4 MEDIUM |
In affected versions of Octopus Server the help sidebar can be customized to include a Cross-Site Scripting payload in the support link. This was initially resolved in advisory 2022-07 however it was identified that the fix could be bypassed in certain circumstances. A different approach was taken to prevent the possibility of the support link being susceptible to XSS | |||||
CVE-2022-2883 | 1 Octopus | 1 Octopus Server | 2025-03-11 | N/A | 7.5 HIGH |
In affected versions of Octopus Deploy it is possible to upload a zipbomb file as a task which results in Denial of Service | |||||
CVE-2022-2259 | 1 Octopus | 1 Octopus Server | 2025-03-03 | N/A | 4.3 MEDIUM |
In affected versions of Octopus Deploy it is possible for a user to view Workerpools without being explicitly assigned permissions to view these items | |||||
CVE-2022-2258 | 1 Octopus | 1 Octopus Server | 2025-02-27 | N/A | 4.3 MEDIUM |
In affected versions of Octopus Deploy it is possible for a user to view Tagsets without being explicitly assigned permissions to view these items | |||||
CVE-2022-4009 | 1 Octopus | 1 Octopus Server | 2025-02-26 | N/A | 8.8 HIGH |
In affected versions of Octopus Deploy it is possible for a user to introduce code via offline package creation | |||||
CVE-2022-2507 | 1 Octopus | 1 Octopus Server | 2025-02-05 | N/A | 5.3 MEDIUM |
In affected versions of Octopus Deploy it is possible to render user supplied input into the webpage | |||||
CVE-2022-4008 | 1 Octopus | 1 Octopus Server | 2025-01-28 | N/A | 5.5 MEDIUM |
In affected versions of Octopus Deploy it is possible to upload a zipbomb file as a task which results in Denial of Service | |||||
CVE-2022-4870 | 1 Octopus | 1 Octopus Server | 2025-01-21 | N/A | 5.3 MEDIUM |
In affected versions of Octopus Deploy it is possible to discover network details via error message | |||||
CVE-2023-1904 | 1 Octopus | 1 Octopus Server | 2024-09-18 | N/A | 7.5 HIGH |
In affected versions of Octopus Server it is possible for the OpenID client secret to be logged in clear text during the configuration of Octopus Server. | |||||
CVE-2023-2247 | 1 Octopus | 1 Octopus Deploy | 2023-12-14 | N/A | 5.3 MEDIUM |
In affected versions of Octopus Deploy it is possible to unmask variable secrets using the variable preview function | |||||
CVE-2021-31822 | 2 Linux, Octopus | 2 Linux Kernel, Tentacle | 2023-11-07 | 4.6 MEDIUM | 7.8 HIGH |
When Octopus Tentacle is installed on a Linux operating system, the systemd service file permissions are misconfigured. This could lead to a local unprivileged user modifying the contents of the systemd service file to gain privileged access. | |||||
CVE-2021-31818 | 1 Octopus | 1 Server | 2023-11-07 | 4.0 MEDIUM | 4.3 MEDIUM |
Affected versions of Octopus Server are prone to an authenticated SQL injection vulnerability in the Events REST API because user supplied data in the API request isn’t parameterised correctly. Exploiting this vulnerability could allow unauthorised access to database tables. | |||||
CVE-2021-31819 | 1 Octopus | 1 Halibut | 2023-11-07 | 10.0 HIGH | 9.8 CRITICAL |
In Halibut versions prior to 4.4.7 there is a deserialisation vulnerability that could allow remote code execution on systems that already trust each other based on certificate verification. | |||||
CVE-2021-31820 | 3 Linux, Microsoft, Octopus | 3 Linux Kernel, Windows, Octopus Server | 2023-11-07 | 5.0 MEDIUM | 7.5 HIGH |
In Octopus Server after version 2018.8.2 if the Octopus Server Web Request Proxy is configured with authentication, the password is shown in plaintext in the UI. |