Vulnerabilities > Octopus > Server > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-05-04 | CVE-2022-1502 | Unspecified vulnerability in Octopus Server Permissions were not properly verified in the API on projects using version control in Git. | 4.3 |
2021-06-17 | CVE-2021-31818 | SQL Injection vulnerability in Octopus Server Affected versions of Octopus Server are prone to an authenticated SQL injection vulnerability in the Events REST API because user supplied data in the API request isn’t parameterised correctly. | 4.3 |
2020-08-25 | CVE-2020-16197 | Improper Certificate Validation vulnerability in Octopus Server and Server An issue was discovered in Octopus Deploy 3.4. | 4.3 |
2019-11-18 | CVE-2019-19085 | Cross-site Scripting vulnerability in Octopus Server A persistent cross-site scripting (XSS) vulnerability in Octopus Server 3.4.0 through 2019.10.5 allows remote authenticated attackers to inject arbitrary web script or HTML. | 5.4 |
2019-08-23 | CVE-2019-15508 | Cleartext Storage of Sensitive Information vulnerability in Octopus Server and Tentacle In Octopus Tentacle versions 3.0.8 to 5.0.0, when a web request proxy is configured, an authenticated user (in certain limited OctopusPrintVariables circumstances) could trigger a deployment that writes the web request proxy password to the deployment log in cleartext. | 6.5 |
2019-08-23 | CVE-2019-15507 | Cleartext Storage of Sensitive Information vulnerability in Octopus Server In Octopus Deploy versions 2018.8.4 to 2019.7.6, when a web request proxy is configured, an authenticated user (in certain limited special-characters circumstances) could trigger a deployment that writes the web request proxy password to the deployment log in cleartext. | 6.5 |