An attacker can send a specially crafted request which could lead to leakage of sensitive data or potentially a resource-based DoS attack.
References
| Link | Resource |
|---|---|
| https://download.wavelink.com/Files/avalanche_v6.4.2_release_notes.txt | Release Notes |
| https://download.wavelink.com/Files/avalanche_v6.4.2_release_notes.txt | Release Notes |
Configurations
History
21 Nov 2024, 05:51
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://download.wavelink.com/Files/avalanche_v6.4.2_release_notes.txt - Release Notes |
28 Dec 2023, 19:10
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:ivanti:avalanche:*:*:*:*:premise:*:*:* | |
| CWE | NVD-CWE-noinfo | |
| References | () https://download.wavelink.com/Files/avalanche_v6.4.2_release_notes.txt - Release Notes | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
19 Dec 2023, 16:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-12-19 16:15
Updated : 2024-11-21 05:51
NVD link : CVE-2021-22962
Mitre link : CVE-2021-22962
CVE.ORG link : CVE-2021-22962
JSON object : View
Products Affected
ivanti
- avalanche
CWE
