Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-34765 | In affected versions of Octopus Deploy it is possible to render user supplied input into the webpage |
| Link | Providers |
|---|---|
| https://advisories.octopus.com/post/2023/sa2023-06/ |
|
Wed, 05 Feb 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-79 | |
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Octopus
Published:
Updated: 2025-02-05T15:50:48.042Z
Reserved: 2022-07-22T00:00:00.000Z
Link: CVE-2022-2507
Updated: 2024-08-03T00:39:07.831Z
Status : Modified
Published: 2023-04-19T08:15:07.903
Modified: 2025-02-05T16:15:32.950
Link: CVE-2022-2507
No data.
OpenCVE Enrichment
No data.
EUVD