Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Octopus_server
(Octopus)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 45 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2023-03-13 | CVE-2022-2258 | In affected versions of Octopus Deploy it is possible for a user to view Tagsets without being explicitly assigned permissions to view these items | Octopus_server | 4.3 | ||
2023-03-16 | CVE-2022-4009 | In affected versions of Octopus Deploy it is possible for a user to introduce code via offline package creation | Octopus_server | 8.8 | ||
2023-04-19 | CVE-2022-2507 | In affected versions of Octopus Deploy it is possible to render user supplied input into the webpage | Octopus_server | 5.3 | ||
2023-05-10 | CVE-2022-4008 | In affected versions of Octopus Deploy it is possible to upload a zipbomb file as a task which results in Denial of Service | Octopus_server | 5.5 | ||
2023-05-18 | CVE-2022-4870 | In affected versions of Octopus Deploy it is possible to discover network details via error message | Octopus_server | 5.3 | ||
2020-08-25 | CVE-2020-16197 | An issue was discovered in Octopus Deploy 3.4. A deployment target can be configured with an Account or Certificate that is outside the scope of the deployment target. An authorised user can potentially use a certificate that they are not in scope to use. An authorised user is also able to obtain certificate metadata by associating a certificate with certain resources that should fail scope validation. | Octopus_server, Server | 4.3 | ||
2021-08-18 | CVE-2021-31820 | In Octopus Server after version 2018.8.2 if the Octopus Server Web Request Proxy is configured with authentication, the password is shown in plaintext in the UI. | Octopus_server | 7.5 | ||
2021-10-07 | CVE-2021-26556 | When Octopus Server is installed using a custom folder location, folder ACLs are not set correctly and could lead to an unprivileged user using DLL side-loading to gain privileged access. | Octopus_deploy, Octopus_server | 7.8 | ||
2022-02-07 | CVE-2022-23184 | In affected Octopus Server versions when the server HTTP and HTTPS bindings are configured to localhost, Octopus Server will allow open redirects. | Octopus_deploy, Octopus_server | 6.1 | ||
2022-05-19 | CVE-2022-1670 | When generating a user invitation code in Octopus Server, the validity of this code can be set for a specific number of users. It was possible to bypass this restriction of validity to create extra user accounts above the initial number of invited users. | Octopus_server | 7.5 |