
CVE-2022-4870
https://notcve.org/view.php?id=CVE-2022-4870
18 May 2023 — In affected versions of Octopus Deploy it is possible to discover network details via error message • https://advisories.octopus.com/post/2023/sa2023-09 • CWE-209: Generation of Error Message Containing Sensitive Information •

CVE-2022-4008
https://notcve.org/view.php?id=CVE-2022-4008
10 May 2023 — In affected versions of Octopus Deploy it is possible to upload a zipbomb file as a task which results in Denial of Service • https://advisories.octopus.com/post/2023/sa2023-08 • CWE-400: Uncontrolled Resource Consumption •

CVE-2022-2507
https://notcve.org/view.php?id=CVE-2022-2507
19 Apr 2023 — In affected versions of Octopus Deploy it is possible to render user supplied input into the webpage • https://advisories.octopus.com/post/2023/sa2023-06 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2022-2883
https://notcve.org/view.php?id=CVE-2022-2883
22 Feb 2023 — In affected versions of Octopus Deploy it is possible to upload a zipbomb file as a task which results in Denial of Service • https://advisories.octopus.com/post/2023/sa2023-02 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVE-2022-2508
https://notcve.org/view.php?id=CVE-2022-2508
27 Oct 2022 — In affected versions of Octopus Server it is possible to reveal the existence of resources in a space that the user does not have access to due to verbose error messaging. En las versiones afectadas de Octopus Server es posible revelar la existencia de recursos en un espacio al que el usuario no tiene acceso debido a mensajes de error detallados. • https://advisories.octopus.com/post/2022/sa2022-22 • CWE-209: Generation of Error Message Containing Sensitive Information •

CVE-2022-2782
https://notcve.org/view.php?id=CVE-2022-2782
26 Oct 2022 — In affected versions of Octopus Server it is possible for a session token to be valid indefinitely due to improper validation of the session token parameters. En las versiones afectadas de Octopus Server, es posible que un token de sesión sea válido indefinidamente debido a una validación incorrecta de los parámetros del token de sesión. • https://advisories.octopus.com/post/2022/sa2022-21 • CWE-613: Insufficient Session Expiration •

CVE-2022-2778
https://notcve.org/view.php?id=CVE-2022-2778
30 Sep 2022 — In affected versions of Octopus Deploy it is possible to bypass rate limiting on login using null bytes. En las versiones afectadas de Octopus Deploy es posible omitir la limitación de velocidad en el inicio de sesión usando bytes nulos • https://advisories.octopus.com/post/2022/sa2022-15 •

CVE-2022-2528
https://notcve.org/view.php?id=CVE-2022-2528
09 Sep 2022 — In affected versions of Octopus Deploy it is possible to upload a package to built-in feed with insufficient permissions after re-indexing packages. En versiones afectadas de Octopus Deploy es posible subir un paquete a la alimentación integrada con permisos insuficientes después de reindexar los paquetes • https://advisories.octopus.com/post/2022/sa2022-13 • CWE-276: Incorrect Default Permissions •

CVE-2022-2075
https://notcve.org/view.php?id=CVE-2022-2075
19 Aug 2022 — In affected versions of Octopus Deploy it is possible to perform a Regex Denial of Service targeting the build information request validation. En versiones afectadas de Octopus Deploy es posible llevar a cabo una denegación de servicio Regex dirigida a una comprobación de la petición de información de construcción. • https://advisories.octopus.com/post/2022/sa2022-12 •

CVE-2022-2074
https://notcve.org/view.php?id=CVE-2022-2074
19 Aug 2022 — In affected versions of Octopus Deploy it is possible to perform a Regex Denial of Service using the Variable Project Template. En versiones afectadas de Octopus Deploy es posible llevar a cabo una Denegación de Servicio Regex usando la Plantilla de Proyecto Variable. • https://advisories.octopus.com/post/2022/sa2022-11 •