Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-34963 | In affected versions of Octopus Server it is possible for target discovery to print certain values marked as sensitive to log files in plaint-text in when verbose logging is enabled. |
| Link | Providers |
|---|---|
| https://advisories.octopus.com/post/2022/sa2022-24/ |
|
Fri, 25 Apr 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Octopus
Published:
Updated: 2025-04-25T17:32:15.673Z
Reserved: 2022-08-09T00:00:00.000Z
Link: CVE-2022-2721
Updated: 2024-08-03T00:46:03.679Z
Status : Modified
Published: 2022-11-25T05:15:12.373
Modified: 2025-04-25T18:15:23.510
Link: CVE-2022-2721
No data.
OpenCVE Enrichment
No data.
EUVD