Octopus Server 3.1.0 Beta 0001

CPE Details

Octopus Server 3.1.0 Beta 0001
3.1.0
2022-07-27 12:50 +00:00
2022-07-27 13:17 +00:00

Alerte pour un CPE

Stay informed of any changes for a specific CPE.
Alert management

CPE Name: cpe:2.3:a:octopus:octopus_server:3.1.0:beta0001:*:*:*:*:*:*

Informations

Vendor

octopus

Product

octopus_server

Version

3.1.0

Update

beta0001

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2022-4870 2023-05-17 22:00 +00:00 In affected versions of Octopus Deploy it is possible to discover network details via error message
5.3
MEDIUM
CVE-2022-4008 2023-05-09 22:00 +00:00 In affected versions of Octopus Deploy it is possible to upload a zipbomb file as a task which results in Denial of Service
5.5
MEDIUM
CVE-2022-2507 2023-04-18 22:00 +00:00 In affected versions of Octopus Deploy it is possible to render user supplied input into the webpage
5.3
MEDIUM
CVE-2022-4009 2023-03-15 23:00 +00:00 In affected versions of Octopus Deploy it is possible for a user to introduce code via offline package creation
8.8
HIGH
CVE-2022-2883 2023-02-21 23:00 +00:00 In affected versions of Octopus Deploy it is possible to upload a zipbomb file as a task which results in Denial of Service
7.5
HIGH
CVE-2022-2508 2022-10-26 22:00 +00:00 In affected versions of Octopus Server it is possible to reveal the existence of resources in a space that the user does not have access to due to verbose error messaging.
5.3
MEDIUM
CVE-2022-2782 2022-10-25 22:00 +00:00 In affected versions of Octopus Server it is possible for a session token to be valid indefinitely due to improper validation of the session token parameters.
9.1
CRITICAL
CVE-2022-2778 2022-09-29 22:00 +00:00 In affected versions of Octopus Deploy it is possible to bypass rate limiting on login using null bytes.
9.8
CRITICAL
CVE-2022-2528 2022-09-09 05:50 +00:00 In affected versions of Octopus Deploy it is possible to upload a package to built-in feed with insufficient permissions after re-indexing packages.
6.5
MEDIUM
CVE-2022-2075 2022-08-19 07:10 +00:00 In affected versions of Octopus Deploy it is possible to perform a Regex Denial of Service targeting the build information request validation.
7.5
HIGH
CVE-2022-2074 2022-08-19 07:00 +00:00 In affected versions of Octopus Deploy it is possible to perform a Regex Denial of Service using the Variable Project Template.
7.5
HIGH
CVE-2022-2049 2022-08-19 06:45 +00:00 In affected versions of Octopus Deploy it is possible to perform a Regex Denial of Service via the package upload function.
7.5
HIGH
CVE-2022-30532 2022-07-19 04:50 +00:00 In affected versions of Octopus Deploy, there is no logging of changes to artifacts within Octopus Deploy.
5.3
MEDIUM
CVE-2022-1670 2022-05-19 02:25 +00:00 When generating a user invitation code in Octopus Server, the validity of this code can be set for a specific number of users. It was possible to bypass this restriction of validity to create extra user accounts above the initial number of invited users.
7.5
HIGH
CVE-2017-11348 2017-07-16 22:00 +00:00 In Octopus Deploy 3.x before 3.15.4, an authenticated user with PackagePush permission to upload packages could upload a maliciously crafted NuGet package, potentially overwriting other packages or modifying system files. This is a directory traversal in the PackageId value.
5.7
MEDIUM
Click on the button to the left (OFF), to authorize the inscription of cookie improving the functionalities of the site. Click on the button to the left (Accept all), to unauthorize the inscription of cookie improving the functionalities of the site.