Octopus

Octopus Server

61 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.13%
  • Veröffentlicht 09.09.2022 08:15:07
  • Zuletzt bearbeitet 21.11.2024 07:01:11

In affected versions of Octopus Deploy it is possible to upload a package to built-in feed with insufficient permissions after re-indexing packages.

  • EPSS 0.48%
  • Veröffentlicht 19.08.2022 09:15:08
  • Zuletzt bearbeitet 21.11.2024 07:00:16

In affected versions of Octopus Deploy it is possible to perform a Regex Denial of Service targeting the build information request validation.

  • EPSS 0.48%
  • Veröffentlicht 19.08.2022 09:15:08
  • Zuletzt bearbeitet 21.11.2024 07:00:16

In affected versions of Octopus Deploy it is possible to perform a Regex Denial of Service using the Variable Project Template.

  • EPSS 0.48%
  • Veröffentlicht 19.08.2022 09:15:08
  • Zuletzt bearbeitet 21.11.2024 07:00:14

In affected versions of Octopus Deploy it is possible to perform a Regex Denial of Service via the package upload function.

  • EPSS 0.21%
  • Veröffentlicht 19.08.2022 08:15:07
  • Zuletzt bearbeitet 21.11.2024 06:41:42

In affected versions of Octopus Deploy it is possible to unmask sensitive variables by using variable preview.

  • EPSS 0.25%
  • Veröffentlicht 19.07.2022 07:15:07
  • Zuletzt bearbeitet 21.11.2024 07:02:53

In affected versions of Octopus Deploy, there is no logging of changes to artifacts within Octopus Deploy.

  • EPSS 0.54%
  • Veröffentlicht 15.07.2022 08:15:07
  • Zuletzt bearbeitet 21.11.2024 06:59:54

In affected versions of Octopus Server the help sidebar can be customized to include a Cross-Site Scripting payload in the support link.

  • EPSS 0.15%
  • Veröffentlicht 15.07.2022 08:15:07
  • Zuletzt bearbeitet 21.11.2024 06:41:40

In affected versions of Octopus Server an Insecure Direct Object Reference vulnerability exists where it is possible for a user to download Project Exports from a Project they do not have permissions to access. This vulnerability only impacts project...

  • EPSS 0.24%
  • Veröffentlicht 19.05.2022 05:15:07
  • Zuletzt bearbeitet 21.11.2024 06:41:13

When generating a user invitation code in Octopus Server, the validity of this code can be set for a specific number of users. It was possible to bypass this restriction of validity to create extra user accounts above the initial number of invited us...

  • EPSS 0.19%
  • Veröffentlicht 07.02.2022 03:15:07
  • Zuletzt bearbeitet 21.11.2024 06:48:09

In affected Octopus Server versions when the server HTTP and HTTPS bindings are configured to localhost, Octopus Server will allow open redirects.