U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • Results Type: Overview
  • Keyword (text search): Octopus Deploy
  • Search Type: Search All
  • CPE Name Search: false
There are 52 matching records.
Displaying matches 1 through 20.
Vuln ID Summary CVSS Severity
CVE-2022-2416

In affected versions of Octopus Deploy it is possible for a low privileged guest user to craft a request that allows enumeration/recon of an environment.

Published: August 02, 2023; 2:15:10 AM -0400
V3.1: 4.3 MEDIUM
V2.0:(not available)
CVE-2022-2346

In affected versions of Octopus Deploy it is possible for a low privileged guest user to interact with extension endpoints.

Published: August 01, 2023; 10:15:12 PM -0400
V3.1: 4.3 MEDIUM
V2.0:(not available)
CVE-2022-4870

In affected versions of Octopus Deploy it is possible to discover network details via error message

Published: May 17, 2023; 8:15:09 PM -0400
V3.1: 5.3 MEDIUM
V2.0:(not available)
CVE-2022-4008

In affected versions of Octopus Deploy it is possible to upload a zipbomb file as a task which results in Denial of Service

Published: May 10, 2023; 2:15:09 AM -0400
V3.1: 5.5 MEDIUM
V2.0:(not available)
CVE-2023-2247

In affected versions of Octopus Deploy it is possible to unmask variable secrets using the variable preview function

Published: May 02, 2023; 1:15:28 AM -0400
V3.1: 5.3 MEDIUM
V2.0:(not available)
CVE-2022-2507

In affected versions of Octopus Deploy it is possible to render user supplied input into the webpage

Published: April 19, 2023; 4:15:07 AM -0400
V3.1: 5.3 MEDIUM
V2.0:(not available)
CVE-2022-4009

In affected versions of Octopus Deploy it is possible for a user to introduce code via offline package creation

Published: March 16, 2023; 12:15:12 AM -0400
V3.1: 8.8 HIGH
V2.0:(not available)
CVE-2022-2259

In affected versions of Octopus Deploy it is possible for a user to view Workerpools without being explicitly assigned permissions to view these items

Published: March 13, 2023; 1:15:11 AM -0400
V3.1: 4.3 MEDIUM
V2.0:(not available)
CVE-2022-2258

In affected versions of Octopus Deploy it is possible for a user to view Tagsets without being explicitly assigned permissions to view these items

Published: March 13, 2023; 1:15:11 AM -0400
V3.1: 4.3 MEDIUM
V2.0:(not available)
CVE-2022-2883

In affected versions of Octopus Deploy it is possible to upload a zipbomb file as a task which results in Denial of Service

Published: February 21, 2023; 8:15:10 PM -0500
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2022-3614

In affected versions of Octopus Deploy users of certain browsers using AD to sign-in to Octopus Server were able to bypass authentication checks and be redirected to the configured redirect url without any validation.

Published: January 02, 2023; 9:15:16 PM -0500
V3.1: 6.1 MEDIUM
V2.0:(not available)
CVE-2022-3460

In affected versions of Octopus Deploy it is possible for certain types of sensitive variables to inadvertently become unmasked when viewed in variable preview.

Published: January 02, 2023; 7:15:10 PM -0500
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2022-2778

In affected versions of Octopus Deploy it is possible to bypass rate limiting on login using null bytes.

Published: September 30, 2022; 12:15:10 AM -0400
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2022-2760

In affected versions of Octopus Deploy it is possible to reveal the Space ID of spaces that the user does not have access to view in an error message when a resource is part of another Space.

Published: September 28, 2022; 8:15:09 AM -0400
V3.1: 4.3 MEDIUM
V2.0:(not available)
CVE-2022-2528

In affected versions of Octopus Deploy it is possible to upload a package to built-in feed with insufficient permissions after re-indexing packages.

Published: September 09, 2022; 4:15:07 AM -0400
V3.1: 6.5 MEDIUM
V2.0:(not available)
CVE-2022-2075

In affected versions of Octopus Deploy it is possible to perform a Regex Denial of Service targeting the build information request validation.

Published: August 19, 2022; 5:15:08 AM -0400
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2022-2074

In affected versions of Octopus Deploy it is possible to perform a Regex Denial of Service using the Variable Project Template.

Published: August 19, 2022; 5:15:08 AM -0400
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2022-2049

In affected versions of Octopus Deploy it is possible to perform a Regex Denial of Service via the package upload function.

Published: August 19, 2022; 5:15:08 AM -0400
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2022-1901

In affected versions of Octopus Deploy it is possible to unmask sensitive variables by using variable preview.

Published: August 19, 2022; 4:15:07 AM -0400
V3.1: 5.3 MEDIUM
V2.0:(not available)
CVE-2022-30532

In affected versions of Octopus Deploy, there is no logging of changes to artifacts within Octopus Deploy.

Published: July 19, 2022; 3:15:07 AM -0400
V3.1: 5.3 MEDIUM
V2.0:(not available)