diff --git a/2021/30xxx/CVE-2021-30170.json b/2021/30xxx/CVE-2021-30170.json index 00ebff96db8..8b0ccb70fa7 100644 --- a/2021/30xxx/CVE-2021-30170.json +++ b/2021/30xxx/CVE-2021-30170.json @@ -38,7 +38,7 @@ "description_data": [ { "lang": "eng", - "value": "Special characters of ERP POS customer profile page are not filtered in users’ input, which allow remote authenticated attackers can inject malicious JavaScript and carry out stored XSS (Stored Cross-site scripting) attacks, additionally access and manipulate customer’s information." + "value": "Special characters of ERP POS customer profile page are not filtered in users\u2019 input, which allow remote authenticated attackers can inject malicious JavaScript and carry out stored XSS (Stored Cross-site scripting) attacks, additionally access and manipulate customer\u2019s information." } ] }, @@ -76,8 +76,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-4707-9c87e-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-4707-9c87e-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-4707-9c87e-1.html" } ] }, diff --git a/2021/30xxx/CVE-2021-30171.json b/2021/30xxx/CVE-2021-30171.json index 8aedb1dcb4c..15a577f7a0f 100644 --- a/2021/30xxx/CVE-2021-30171.json +++ b/2021/30xxx/CVE-2021-30171.json @@ -38,7 +38,7 @@ "description_data": [ { "lang": "eng", - "value": "Special characters of ERP POS news page are not filtered in users’ input, which allow remote authenticated attackers can inject malicious JavaScript and carry out stored XSS (Stored Cross-site scripting) attacks, additionally access and manipulate customer’s information." + "value": "Special characters of ERP POS news page are not filtered in users\u2019 input, which allow remote authenticated attackers can inject malicious JavaScript and carry out stored XSS (Stored Cross-site scripting) attacks, additionally access and manipulate customer\u2019s information." } ] }, @@ -76,8 +76,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-4707-9c87e-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-4707-9c87e-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-4707-9c87e-1.html" } ] }, diff --git a/2021/30xxx/CVE-2021-30172.json b/2021/30xxx/CVE-2021-30172.json index d0e648424cb..0833732f2f8 100644 --- a/2021/30xxx/CVE-2021-30172.json +++ b/2021/30xxx/CVE-2021-30172.json @@ -38,7 +38,7 @@ "description_data": [ { "lang": "eng", - "value": "Special characters of picture preview page in the Quan-Fang-Wei-Tong-Xun system are not filtered in users’ input, which allow remote authenticated attackers can inject malicious JavaScript and carry out Reflected XSS (Cross-site scripting) attacks, additionally access and manipulate customer’s information." + "value": "Special characters of picture preview page in the Quan-Fang-Wei-Tong-Xun system are not filtered in users\u2019 input, which allow remote authenticated attackers can inject malicious JavaScript and carry out Reflected XSS (Cross-site scripting) attacks, additionally access and manipulate customer\u2019s information." } ] }, @@ -76,8 +76,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-4711-04469-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-4711-04469-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-4711-04469-1.html" } ] }, diff --git a/2021/30xxx/CVE-2021-30173.json b/2021/30xxx/CVE-2021-30173.json index 7dd20d4cae1..5211082a7ae 100644 --- a/2021/30xxx/CVE-2021-30173.json +++ b/2021/30xxx/CVE-2021-30173.json @@ -76,8 +76,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-4712-7ade4-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-4712-7ade4-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-4712-7ade4-1.html" } ] },