
CVE-2023-4509
https://notcve.org/view.php?id=CVE-2023-4509
17 Apr 2024 — It is possible for an API key to be logged in clear text in the audit log file after an invalid login attempt. Es posible que una clave API se registre en texto plano en el archivo de registro de auditoría después de un intento de inicio de sesión no válido. • https://advisories.octopus.com/post/2024/sa2024-02 • CWE-319: Cleartext Transmission of Sensitive Information •

CVE-2024-2975
https://notcve.org/view.php?id=CVE-2024-2975
09 Apr 2024 — A race condition was identified through which privilege escalation was possible in certain configurations. Se identificó una condición de ejecución a través de la cual era posible la escalada de privilegios en ciertas configuraciones. • https://advisories.octopus.com/post/2024/sa2024-01 • CWE-1223: Race Condition for Write-Once Attributes •

CVE-2023-1904
https://notcve.org/view.php?id=CVE-2023-1904
14 Dec 2023 — In affected versions of Octopus Server it is possible for the OpenID client secret to be logged in clear text during the configuration of Octopus Server. En las versiones afectadas de Octopus Server, es posible que el secreto del cliente OpenID se registre en texto plano durante la configuración de Octopus Server. • https://advisories.octopus.com/post/2023/sa2023-12 • CWE-532: Insertion of Sensitive Information into Log File •

CVE-2022-2416
https://notcve.org/view.php?id=CVE-2022-2416
02 Aug 2023 — In affected versions of Octopus Deploy it is possible for a low privileged guest user to craft a request that allows enumeration/recon of an environment. • https://advisories.octopus.com/post/2023/sa2023-11 • CWE-918: Server-Side Request Forgery (SSRF) •

CVE-2022-2346
https://notcve.org/view.php?id=CVE-2022-2346
02 Aug 2023 — In affected versions of Octopus Deploy it is possible for a low privileged guest user to interact with extension endpoints. • https://advisories.octopus.com/post/2023/sa2023-10 •

CVE-2022-4870
https://notcve.org/view.php?id=CVE-2022-4870
18 May 2023 — In affected versions of Octopus Deploy it is possible to discover network details via error message • https://advisories.octopus.com/post/2023/sa2023-09 • CWE-209: Generation of Error Message Containing Sensitive Information •

CVE-2022-4008
https://notcve.org/view.php?id=CVE-2022-4008
10 May 2023 — In affected versions of Octopus Deploy it is possible to upload a zipbomb file as a task which results in Denial of Service • https://advisories.octopus.com/post/2023/sa2023-08 • CWE-400: Uncontrolled Resource Consumption •

CVE-2023-2247
https://notcve.org/view.php?id=CVE-2023-2247
02 May 2023 — In affected versions of Octopus Deploy it is possible to unmask variable secrets using the variable preview function • https://advisories.octopus.com/post/2023/sa2023-07 •

CVE-2022-2507
https://notcve.org/view.php?id=CVE-2022-2507
19 Apr 2023 — In affected versions of Octopus Deploy it is possible to render user supplied input into the webpage • https://advisories.octopus.com/post/2023/sa2023-06 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2022-4009
https://notcve.org/view.php?id=CVE-2022-4009
16 Mar 2023 — In affected versions of Octopus Deploy it is possible for a user to introduce code via offline package creation • https://advisories.octopus.com/post/2023/sa2023-05 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •