10 results (0.003 seconds)

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

10 May 2023 — In affected versions of Octopus Deploy it is possible to upload a zipbomb file as a task which results in Denial of Service • https://advisories.octopus.com/post/2023/sa2023-08 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 5.3EPSS: 0%CPEs: 3EXPL: 0

19 Apr 2023 — In affected versions of Octopus Deploy it is possible to render user supplied input into the webpage • https://advisories.octopus.com/post/2023/sa2023-06 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

22 Feb 2023 — In affected versions of Octopus Deploy it is possible to upload a zipbomb file as a task which results in Denial of Service • https://advisories.octopus.com/post/2023/sa2023-02 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 5.3EPSS: 0%CPEs: 4EXPL: 0

27 Oct 2022 — In affected versions of Octopus Server it is possible to reveal the existence of resources in a space that the user does not have access to due to verbose error messaging. En las versiones afectadas de Octopus Server es posible revelar la existencia de recursos en un espacio al que el usuario no tiene acceso debido a mensajes de error detallados. • https://advisories.octopus.com/post/2022/sa2022-22 • CWE-209: Generation of Error Message Containing Sensitive Information •

CVSS: 9.4EPSS: 0%CPEs: 3EXPL: 0

26 Oct 2022 — In affected versions of Octopus Server it is possible for a session token to be valid indefinitely due to improper validation of the session token parameters. En las versiones afectadas de Octopus Server, es posible que un token de sesión sea válido indefinidamente debido a una validación incorrecta de los parámetros del token de sesión. • https://advisories.octopus.com/post/2022/sa2022-21 • CWE-613: Insufficient Session Expiration •

CVSS: 7.8EPSS: 0%CPEs: 14EXPL: 0

19 Aug 2022 — In affected versions of Octopus Deploy it is possible to perform a Regex Denial of Service targeting the build information request validation. En versiones afectadas de Octopus Deploy es posible llevar a cabo una denegación de servicio Regex dirigida a una comprobación de la petición de información de construcción. • https://advisories.octopus.com/post/2022/sa2022-12 •

CVSS: 7.8EPSS: 0%CPEs: 14EXPL: 0

19 Aug 2022 — In affected versions of Octopus Deploy it is possible to perform a Regex Denial of Service using the Variable Project Template. En versiones afectadas de Octopus Deploy es posible llevar a cabo una Denegación de Servicio Regex usando la Plantilla de Proyecto Variable. • https://advisories.octopus.com/post/2022/sa2022-11 •

CVSS: 7.8EPSS: 0%CPEs: 14EXPL: 0

19 Aug 2022 — In affected versions of Octopus Deploy it is possible to perform a Regex Denial of Service via the package upload function. En versiones afectadas de Octopus Deploy es posible llevar a cabo una Denegación de Servicio Regex por medio de la función package upload. • https://advisories.octopus.com/post/2022/sa2022-10 •

CVSS: 5.3EPSS: 0%CPEs: 5EXPL: 0

19 Jul 2022 — In affected versions of Octopus Deploy, there is no logging of changes to artifacts within Octopus Deploy. En las versiones afectadas de Octopus Deploy, no se presenta registro de los cambios en los artefactos dentro de Octopus Deploy. • https://advisories.octopus.com/post/2022/sa2022-08 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

19 May 2022 — When generating a user invitation code in Octopus Server, the validity of this code can be set for a specific number of users. It was possible to bypass this restriction of validity to create extra user accounts above the initial number of invited users. Cuando es generado un código de invitación de usuario en Octopus Server, la comprobación de este código puede establecerse para un número específico de usuarios. Era posible omitir esta restricción de comprobación para crear cuentas de usuario adicionales p... • https://advisories.octopus.com/post/2022/sa2022-04 •