VYPR

Server

by Octopus

Source repositories

CVEs (61)

  • CVE-2022-2783Oct 6, 2022
    risk 0.00cvss epss 0.00

    In affected versions of Octopus Server it was identified that a session cookie could be used as the CSRF token

  • CVE-2022-2778Sep 30, 2022
    risk 0.00cvss epss 0.01

    In affected versions of Octopus Deploy it is possible to bypass rate limiting on login using null bytes.

  • CVE-2022-2760Sep 28, 2022
    risk 0.00cvss epss 0.00

    In affected versions of Octopus Deploy it is possible to reveal the Space ID of spaces that the user does not have access to view in an error message when a resource is part of another Space.

  • CVE-2022-2528Sep 9, 2022
    risk 0.00cvss epss 0.00

    In affected versions of Octopus Deploy it is possible to upload a package to built-in feed with insufficient permissions after re-indexing packages.

  • CVE-2022-2075Aug 19, 2022
    risk 0.00cvss epss 0.00

    In affected versions of Octopus Deploy it is possible to perform a Regex Denial of Service targeting the build information request validation.

  • CVE-2022-2074Aug 19, 2022
    risk 0.00cvss epss 0.00

    In affected versions of Octopus Deploy it is possible to perform a Regex Denial of Service using the Variable Project Template.

  • CVE-2022-2049Aug 19, 2022
    risk 0.00cvss epss 0.00

    In affected versions of Octopus Deploy it is possible to perform a Regex Denial of Service via the package upload function.

  • CVE-2022-1901Aug 19, 2022
    risk 0.00cvss epss 0.00

    In affected versions of Octopus Deploy it is possible to unmask sensitive variables by using variable preview.

  • CVE-2022-30532Jul 19, 2022
    risk 0.00cvss epss 0.00

    In affected versions of Octopus Deploy, there is no logging of changes to artifacts within Octopus Deploy.

  • CVE-2022-29890Jul 15, 2022
    risk 0.00cvss epss 0.01

    In affected versions of Octopus Server the help sidebar can be customized to include a Cross-Site Scripting payload in the support link.

  • CVE-2022-1881Jul 15, 2022
    risk 0.00cvss epss 0.00

    In affected versions of Octopus Server an Insecure Direct Object Reference vulnerability exists where it is possible for a user to download Project Exports from a Project they do not have permissions to access. This vulnerability only impacts projects within the same Space.

  • CVE-2022-2013Jun 12, 2022
    risk 0.00cvss epss 0.00

    In Octopus Server after version 2022.1.1495 and before 2022.1.2647 if private spaces were enabled via the experimental feature flag all new users would have access to the Script Console within their private space.

  • CVE-2022-1670May 19, 2022
    risk 0.00cvss epss 0.00

    When generating a user invitation code in Octopus Server, the validity of this code can be set for a specific number of users. It was possible to bypass this restriction of validity to create extra user accounts above the initial number of invited users.

  • CVE-2022-1502May 4, 2022
    risk 0.00cvss epss 0.00

    Permissions were not properly verified in the API on projects using version control in Git. This allowed projects to be modified by users with only ProjectView permissions.

  • CVE-2022-23184Feb 7, 2022
    risk 0.00cvss epss 0.00

    In affected Octopus Server versions when the server HTTP and HTTPS bindings are configured to localhost, Octopus Server will allow open redirects.

  • CVE-2021-26556Oct 7, 2021
    risk 0.00cvss epss 0.00

    When Octopus Server is installed using a custom folder location, folder ACLs are not set correctly and could lead to an unprivileged user using DLL side-loading to gain privileged access.

  • CVE-2021-31820Aug 18, 2021
    risk 0.00cvss epss 0.00

    In Octopus Server after version 2018.8.2 if the Octopus Server Web Request Proxy is configured with authentication, the password is shown in plaintext in the UI.

  • CVE-2021-31817Jul 8, 2021
    risk 0.00cvss epss 0.00

    When configuring Octopus Server if it is configured with an external SQL database, on initial configuration the database password is written to the OctopusServer.txt log file in plaintext.

  • CVE-2021-31816Jul 8, 2021
    risk 0.00cvss epss 0.00

    When configuring Octopus Server if it is configured with an external SQL database, on initial configuration the database password is written to the OctopusServer.txt log file in plaintext.

  • CVE-2021-31818Jun 17, 2021
    risk 0.00cvss epss 0.00

    Affected versions of Octopus Server are prone to an authenticated SQL injection vulnerability in the Events REST API because user supplied data in the API request isn’t parameterised correctly. Exploiting this vulnerability could allow unauthorised access to database tables.