diff --git a/advisories/unreviewed/2024/12/GHSA-62rj-q587-5xq8/GHSA-62rj-q587-5xq8.json b/advisories/unreviewed/2024/12/GHSA-62rj-q587-5xq8/GHSA-62rj-q587-5xq8.json index cc6e58a35836f..57a768911612b 100644 --- a/advisories/unreviewed/2024/12/GHSA-62rj-q587-5xq8/GHSA-62rj-q587-5xq8.json +++ b/advisories/unreviewed/2024/12/GHSA-62rj-q587-5xq8/GHSA-62rj-q587-5xq8.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-62rj-q587-5xq8", - "modified": "2024-12-21T00:33:05Z", + "modified": "2024-12-25T03:30:42Z", "published": "2024-12-21T00:33:05Z", "aliases": [ "CVE-2021-40959" ], "details": "A reflected cross-site scripting vulnerability in MONITORAPP Application Insight Web Application Firewall (AIWAF) <= 4.1.6 and <=5.0 was identified on the subpage `/process_management/process_status.xhr.php`. This vulnerability allows an attacker to inject malicious scripts that execute in the context of the victim's session.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-12-20T22:15:24Z"