Vulnerabilities > Octopus > Critical

DATE CVE VULNERABILITY TITLE RISK
2022-11-01 CVE-2022-2572 Improper Authentication vulnerability in Octopus Server
In affected versions of Octopus Server where access is managed by an external authentication provider, it was possible that the API key/keys of a disabled/deleted user were still valid after the access was revoked.
network
low complexity
octopus CWE-287
critical
9.8
2022-10-27 CVE-2022-2782 Insufficient Session Expiration vulnerability in Octopus Server
In affected versions of Octopus Server it is possible for a session token to be valid indefinitely due to improper validation of the session token parameters.
network
low complexity
octopus CWE-613
critical
9.1
2022-09-30 CVE-2022-2778 Unspecified vulnerability in Octopus Server
In affected versions of Octopus Deploy it is possible to bypass rate limiting on login using null bytes.
network
low complexity
octopus
critical
9.8
2021-09-22 CVE-2021-31819 Deserialization of Untrusted Data vulnerability in Octopus Halibut
In Halibut versions prior to 4.4.7 there is a deserialisation vulnerability that could allow remote code execution on systems that already trust each other based on certificate verification.
network
low complexity
octopus CWE-502
critical
9.8
2018-10-31 CVE-2018-18850 Unspecified vulnerability in Octopus Server
In Octopus Deploy 2018.8.0 through 2018.9.x before 2018.9.1, an authenticated user with permission to modify deployment processes could upload a maliciously crafted YAML configuration, potentially allowing for remote execution of arbitrary code, running in the same context as the Octopus Server (for self-hosted installations by default, SYSTEM).
network
low complexity
octopus
critical
9.0