Show filters
100 Total Results
Displaying 51-60 of 100
Sort by:
Attacker Value
Unknown

CVE-2022-23184

Disclosure Date: February 07, 2022 (last updated February 23, 2025)
In affected Octopus Server versions when the server HTTP and HTTPS bindings are configured to localhost, Octopus Server will allow open redirects.
Attacker Value
Unknown

CVE-2021-31821

Disclosure Date: January 19, 2022 (last updated February 23, 2025)
When the Windows Tentacle docker image starts up it logs all the commands that it runs along with the arguments, which writes the Octopus Server API key in plaintext. This does not affect the Linux Docker image
Attacker Value
Unknown

CVE-2021-31822

Disclosure Date: November 24, 2021 (last updated February 23, 2025)
When Octopus Tentacle is installed on a Linux operating system, the systemd service file permissions are misconfigured. This could lead to a local unprivileged user modifying the contents of the systemd service file to gain privileged access.
Attacker Value
Unknown

CVE-2021-26557

Disclosure Date: October 07, 2021 (last updated February 23, 2025)
When Octopus Tentacle is installed using a custom folder location, folder ACLs are not set correctly and could lead to an unprivileged user using DLL side-loading to gain privileged access.
Attacker Value
Unknown

CVE-2021-26556

Disclosure Date: October 07, 2021 (last updated February 23, 2025)
When Octopus Server is installed using a custom folder location, folder ACLs are not set correctly and could lead to an unprivileged user using DLL side-loading to gain privileged access.
Attacker Value
Unknown

CVE-2021-31819

Disclosure Date: September 22, 2021 (last updated February 23, 2025)
In Halibut versions prior to 4.4.7 there is a deserialisation vulnerability that could allow remote code execution on systems that already trust each other based on certificate verification.
Attacker Value
Unknown

CVE-2021-31820

Disclosure Date: August 18, 2021 (last updated February 23, 2025)
In Octopus Server after version 2018.8.2 if the Octopus Server Web Request Proxy is configured with authentication, the password is shown in plaintext in the UI.
Attacker Value
Unknown

CVE-2021-31817

Disclosure Date: July 08, 2021 (last updated February 23, 2025)
When configuring Octopus Server if it is configured with an external SQL database, on initial configuration the database password is written to the OctopusServer.txt log file in plaintext.
Attacker Value
Unknown

CVE-2021-31816

Disclosure Date: July 08, 2021 (last updated February 23, 2025)
When configuring Octopus Server if it is configured with an external SQL database, on initial configuration the database password is written to the OctopusServer.txt log file in plaintext.
Attacker Value
Unknown

CVE-2021-31818

Disclosure Date: June 17, 2021 (last updated February 22, 2025)
Affected versions of Octopus Server are prone to an authenticated SQL injection vulnerability in the Events REST API because user supplied data in the API request isn’t parameterised correctly. Exploiting this vulnerability could allow unauthorised access to database tables.