Octopus Server 2020.6.4688

CPE Details

Octopus Server 2020.6.4688
2020.6.4688
2022-07-19
16h12 +00:00
2022-07-27
15h20 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:octopus:server:2020.6.4688:*:*:*:*:*:*:*

Informations

Vendor

octopus

Product

server

Version

2020.6.4688

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2021-31817 2021-07-08 08h43 +00:00 When configuring Octopus Server if it is configured with an external SQL database, on initial configuration the database password is written to the OctopusServer.txt log file in plaintext.
7.5
Haute
CVE-2021-31816 2021-07-08 08h43 +00:00 When configuring Octopus Server if it is configured with an external SQL database, on initial configuration the database password is written to the OctopusServer.txt log file in plaintext.
7.5
Haute
CVE-2021-31818 2021-06-17 11h22 +00:00 Affected versions of Octopus Server are prone to an authenticated SQL injection vulnerability in the Events REST API because user supplied data in the API request isn’t parameterised correctly. Exploiting this vulnerability could allow unauthorised access to database tables.
4.3
Moyen
CVE-2021-30183 2021-05-14 08h36 +00:00 Cleartext storage of sensitive information in multiple versions of Octopus Server where in certain situations when running import or export processes, the password used to encrypt and decrypt sensitive values would be written to the logs in plaintext.
7.5
Haute