47 results (0.002 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

17 Apr 2024 — It is possible for an API key to be logged in clear text in the audit log file after an invalid login attempt. Es posible que una clave API se registre en texto plano en el archivo de registro de auditoría después de un intento de inicio de sesión no válido. • https://advisories.octopus.com/post/2024/sa2024-02 • CWE-319: Cleartext Transmission of Sensitive Information •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 0

09 Apr 2024 — A race condition was identified through which privilege escalation was possible in certain configurations. Se identificó una condición de ejecución a través de la cual era posible la escalada de privilegios en ciertas configuraciones. • https://advisories.octopus.com/post/2024/sa2024-01 • CWE-1223: Race Condition for Write-Once Attributes •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

14 Dec 2023 — In affected versions of Octopus Server it is possible for the OpenID client secret to be logged in clear text during the configuration of Octopus Server. En las versiones afectadas de Octopus Server, es posible que el secreto del cliente OpenID se registre en texto plano durante la configuración de Octopus Server. • https://advisories.octopus.com/post/2023/sa2023-12 • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0

02 Aug 2023 — In affected versions of Octopus Deploy it is possible for a low privileged guest user to craft a request that allows enumeration/recon of an environment. • https://advisories.octopus.com/post/2023/sa2023-11 • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0

02 Aug 2023 — In affected versions of Octopus Deploy it is possible for a low privileged guest user to interact with extension endpoints. • https://advisories.octopus.com/post/2023/sa2023-10 •

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 0

18 May 2023 — In affected versions of Octopus Deploy it is possible to discover network details via error message • https://advisories.octopus.com/post/2023/sa2023-09 • CWE-209: Generation of Error Message Containing Sensitive Information •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

10 May 2023 — In affected versions of Octopus Deploy it is possible to upload a zipbomb file as a task which results in Denial of Service • https://advisories.octopus.com/post/2023/sa2023-08 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 5.3EPSS: 0%CPEs: 3EXPL: 0

19 Apr 2023 — In affected versions of Octopus Deploy it is possible to render user supplied input into the webpage • https://advisories.octopus.com/post/2023/sa2023-06 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.0EPSS: 0%CPEs: 3EXPL: 0

16 Mar 2023 — In affected versions of Octopus Deploy it is possible for a user to introduce code via offline package creation • https://advisories.octopus.com/post/2023/sa2023-05 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 4.3EPSS: 0%CPEs: 4EXPL: 0

13 Mar 2023 — In affected versions of Octopus Deploy it is possible for a user to view Tagsets without being explicitly assigned permissions to view these items • https://advisories.octopus.com/post/2023/sa2023-03 •