Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-35021 | In affected versions of Octopus Server it is possible to use the Git Connectivity test function on the VCS project to initiate an SMB request resulting in the potential for an NTLM relay attack. |
| Link | Providers |
|---|---|
| https://advisories.octopus.com/post/2022/sa2022-20/ |
|
Thu, 15 May 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Octopus
Published:
Updated: 2025-05-15T15:09:13.386Z
Reserved: 2022-08-11T00:00:00.000Z
Link: CVE-2022-2780
Updated: 2024-08-03T00:46:04.527Z
Status : Modified
Published: 2022-10-14T07:15:08.947
Modified: 2025-05-15T15:15:53.530
Link: CVE-2022-2780
No data.
OpenCVE Enrichment
No data.
EUVD