Octopus Deploy Security Advisories
Home
Advisories icon
2021 2022 2023
Severity Levels
Disclosure Policy
  • Security Advisory 2023-05

    Mar 13, 2023 ยท Vulnerability/Improper Neutralisation of Special Elements used in a Command Severity/low CVSS/3.9

    Command injection via offline package creation (CVE-2022-4009)

    Read More

Recent Security Advisories

  • Security Advisory 2023-11
  • Security Advisory 2023-10
  • Security Advisory 2023-09
  • Security Advisory 2023-08
  • Security Advisory 2023-07
  • Security Advisory 2023-06
  • Security Advisory 2023-05
  • Security Advisory 2023-03

Products

OCTOPUS-SERVER 43 OCTOPUS-TENTACLE 4 OCTOPUS-DEPLOY-TEAMCITY-PLUGIN 3 OCTOPUS-JAVA-SDK 3 HALIBUT 1

Tags

SEVERITY/MEDIUM 28 SEVERITY/LOW 16 SEVERITY/HIGH 10 VULNERABILITY/VULNERABLE-DEPENDENCY 6 VULNERABILITY/CLEAR-TEXT-STORAGE-OF-SENSITIVE-VALUE 5 CVSS/6.5 4 VULNERABILITY/BROKEN-ACCESS-CONTROL 4 VULNERABILITY/INFORMATION-EXPOSURE 4 CVSS/5.5 3 CVSS/5.7 3 CVSS/6.4 3 CVSS/6.8 3 VULNERABILITY/INCORRECT-PRIVILEGE-ASSIGNMENT 3 VULNERABILITY/LOCAL-PRIVILEGE-ESCALATION 3
All Tags
CVSS/2.21 CVSS/2.41 CVSS/2.51 CVSS/3.01 CVSS/3.12 CVSS/3.41 CVSS/3.51 CVSS/3.61 CVSS/3.81 CVSS/3.91 CVSS/4.11 CVSS/4.31 CVSS/5.31 CVSS/5.41 CVSS/5.53 CVSS/5.73 CVSS/5.91 CVSS/6.32 CVSS/6.43 CVSS/6.54 CVSS/6.83 CVSS/7.11 CVSS/7.31 CVSS/8.01 SEVERITY/HIGH10 SEVERITY/LOW16 SEVERITY/MEDIUM28 VULNERABILITY/ABNORMAL-INVITE-CODE-FUNCTIONALITY1 VULNERABILITY/AUTHENTICATION-BYPASS-BY-CAPTURE-REPLAY1 VULNERABILITY/AUTHENTICATION-BYPASS-USING-AN-ALTERNATE-PATH-OR-CHANNEL1 VULNERABILITY/BROKEN-ACCESS-CONTROL4 VULNERABILITY/CLEAR-TEXT-STORAGE-OF-SENSITIVE-VALUE5 VULNERABILITY/CROSS-SITE-SCRIPTING-XSS1 VULNERABILITY/CSRF1 VULNERABILITY/DENIAL-OF-SERVICE2 VULNERABILITY/ENCRYPTION1 VULNERABILITY/EXPOSURE-OF-SENSITIVE-INFORMATION-THROUGH-ENVIRONMENTAL-VARIABLES1 VULNERABILITY/IMPROPER-NEUTRALISATION-OF-SPECIAL-ELEMENTS-USED-IN-A-COMMAND1 VULNERABILITY/INCORRECT-PRIVILEGE-ASSIGNMENT3 VULNERABILITY/INFORMATION-EXPOSURE4 VULNERABILITY/INSECURE-DIRECT-OBJECT-REFERENCE-IDOR1 VULNERABILITY/INSERTION-OF-SENSITIVE-INFORMATION-INTO-LOG-FILE1 VULNERABILITY/INSUFFICIENT-SESSION-EXPIRATION1 VULNERABILITY/LOCAL-PRIVILEGE-ESCALATION3 VULNERABILITY/LOGGING1 VULNERABILITY/OPEN-REDIRECT1 VULNERABILITY/RATE-LIMIT-BYPASS1 VULNERABILITY/REGEX-DENIAL-OF-SERVICE3 VULNERABILITY/REMOTE-CODE-EXECUTION3 VULNERABILITY/SENSITIVE-VARIABLE-EXPOSURE1 VULNERABILITY/SERVER-SIDE-REQUEST-FORGERY1 VULNERABILITY/SERVER-SIDE-REQUEST-FORGERY-SSRF1 VULNERABILITY/SQL-INJECTION1 VULNERABILITY/STORED-XSS2 VULNERABILITY/VARIABLE-SECRET-EXPOSURE1 VULNERABILITY/VULNERABLE-DEPENDENCY6
[A~Z][0~9]
 Octopus Deploy Security Advisories

Copyright   OCTOPUS DEPLOY SECURITY ADVISORIES. All Rights Reserved