Octopus Deploy Security Advisories
Home
Advisories icon
2021 2022
Severity Levels
Disclosure Policy
  • Security Advisory 2022-17

    Oct 6, 2022 ยท Vulnerability/CSRF Severity/medium CVSS/6.3

    Session cookie can be used as the CSRF token (CVE-2022-2783)

    Read More

Recent Security Advisories

  • Security Advisory 2022-27
  • Security Advisory 2022-26
  • Security Advisory 2022-25
  • Security Advisory 2022-24
  • Security Advisory 2022-23
  • Security Advisory 2022-22
  • Security Advisory 2022-21
  • Security Advisory 2022-20

Products

OCTOPUS-SERVER 34 OCTOPUS-DEPLOY-TEAMCITY-PLUGIN 3 OCTOPUS-JAVA-SDK 3 OCTOPUS-TENTACLE 3 HALIBUT 1

Tags

SEVERITY/MEDIUM 24 SEVERITY/HIGH 10 SEVERITY/LOW 10 VULNERABILITY/VULNERABLE-DEPENDENCY 6 VULNERABILITY/CLEAR-TEXT-STORAGE-OF-SENSITIVE-VALUE 5 VULNERABILITY/BROKEN-ACCESS-CONTROL 4 VULNERABILITY/INFORMATION-EXPOSURE 4 CVSS/5.7 3 CVSS/6.4 3 CVSS/6.8 3 VULNERABILITY/LOCAL-PRIVILEGE-ESCALATION 3 VULNERABILITY/REGEX-DENIAL-OF-SERVICE 3 VULNERABILITY/REMOTE-CODE-EXECUTION 3 CVSS/6.3 2
All Tags
CVSS/2.21 CVSS/2.41 CVSS/3.01 CVSS/3.41 CVSS/3.61 CVSS/4.11 CVSS/4.31 CVSS/5.31 CVSS/5.41 CVSS/5.51 CVSS/5.73 CVSS/5.91 CVSS/6.32 CVSS/6.43 CVSS/6.52 CVSS/6.83 CVSS/7.11 CVSS/7.31 CVSS/8.01 SEVERITY/HIGH10 SEVERITY/LOW10 SEVERITY/MEDIUM24 VULNERABILITY/ABNORMAL-INVITE-CODE-FUNCTIONALITY1 VULNERABILITY/AUTHENTICATION-BYPASS-BY-CAPTURE-REPLAY1 VULNERABILITY/AUTHENTICATION-BYPASS-USING-AN-ALTERNATE-PATH-OR-CHANNEL1 VULNERABILITY/BROKEN-ACCESS-CONTROL4 VULNERABILITY/CLEAR-TEXT-STORAGE-OF-SENSITIVE-VALUE5 VULNERABILITY/CSRF1 VULNERABILITY/ENCRYPTION1 VULNERABILITY/EXPOSURE-OF-SENSITIVE-INFORMATION-THROUGH-ENVIRONMENTAL-VARIABLES1 VULNERABILITY/INFORMATION-EXPOSURE4 VULNERABILITY/INSECURE-DIRECT-OBJECT-REFERENCE-IDOR1 VULNERABILITY/INSERTION-OF-SENSITIVE-INFORMATION-INTO-LOG-FILE1 VULNERABILITY/INSUFFICIENT-SESSION-EXPIRATION1 VULNERABILITY/LOCAL-PRIVILEGE-ESCALATION3 VULNERABILITY/LOGGING1 VULNERABILITY/OPEN-REDIRECT1 VULNERABILITY/RATE-LIMIT-BYPASS1 VULNERABILITY/REGEX-DENIAL-OF-SERVICE3 VULNERABILITY/REMOTE-CODE-EXECUTION3 VULNERABILITY/SENSITIVE-VARIABLE-EXPOSURE1 VULNERABILITY/SQL-INJECTION1 VULNERABILITY/STORED-XSS2 VULNERABILITY/VULNERABLE-DEPENDENCY6
[A~Z][0~9]
 Octopus Deploy Security Advisories

Copyright   OCTOPUS DEPLOY SECURITY ADVISORIES. All Rights Reserved