diff --git a/2022/39xxx/CVE-2022-39043.json b/2022/39xxx/CVE-2022-39043.json index 98051dbc03f..2af1bd264ae 100644 --- a/2022/39xxx/CVE-2022-39043.json +++ b/2022/39xxx/CVE-2022-39043.json @@ -83,8 +83,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-6922-4a37a-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-6922-4a37a-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-6922-4a37a-1.html" } ] }, diff --git a/2023/22xxx/CVE-2023-22902.json b/2023/22xxx/CVE-2023-22902.json index 8a999b42705..13bb68d0e30 100644 --- a/2023/22xxx/CVE-2023-22902.json +++ b/2023/22xxx/CVE-2023-22902.json @@ -80,8 +80,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-6953-79236-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-6953-79236-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-6953-79236-1.html" } ] }, diff --git a/2023/24xxx/CVE-2023-24834.json b/2023/24xxx/CVE-2023-24834.json index 263a25dd5b7..79850ede3e3 100644 --- a/2023/24xxx/CVE-2023-24834.json +++ b/2023/24xxx/CVE-2023-24834.json @@ -76,8 +76,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-6954-ed16b-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-6954-ed16b-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-6954-ed16b-1.html" } ] }, diff --git a/2023/24xxx/CVE-2023-24835.json b/2023/24xxx/CVE-2023-24835.json index 55d1272cd68..58475e3ee82 100644 --- a/2023/24xxx/CVE-2023-24835.json +++ b/2023/24xxx/CVE-2023-24835.json @@ -38,7 +38,7 @@ "description_data": [ { "lang": "eng", - "value": "Softnext Technologies Corp.’s SPAM SQR has a vulnerability of Code Injection within its specific function. An authenticated remote attacker with administrator privilege can exploit this vulnerability to execute arbitrary system command to perform arbitrary system operation or disrupt service." + "value": "Softnext Technologies Corp.\u2019s SPAM SQR has a vulnerability of Code Injection within its specific function. An authenticated remote attacker with administrator privilege can exploit this vulnerability to execute arbitrary system command to perform arbitrary system operation or disrupt service." } ] }, @@ -76,8 +76,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-6955-c7612-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-6955-c7612-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-6955-c7612-1.html" } ] }, diff --git a/2023/24xxx/CVE-2023-24837.json b/2023/24xxx/CVE-2023-24837.json index 1732e290586..f230791d37e 100644 --- a/2023/24xxx/CVE-2023-24837.json +++ b/2023/24xxx/CVE-2023-24837.json @@ -76,8 +76,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-6956-fbd85-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-6956-fbd85-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-6956-fbd85-1.html" } ] }, diff --git a/2023/24xxx/CVE-2023-24838.json b/2023/24xxx/CVE-2023-24838.json index d70c213e7a2..fe1e6b15dc5 100644 --- a/2023/24xxx/CVE-2023-24838.json +++ b/2023/24xxx/CVE-2023-24838.json @@ -38,7 +38,7 @@ "description_data": [ { "lang": "eng", - "value": "HGiga PowerStation has a vulnerability of Information Leakage. An unauthenticated remote attacker can exploit this vulnerability to obtain the administrator’s credential, resulting in performing arbitrary system operation or disrupt service." + "value": "HGiga PowerStation has a vulnerability of Information Leakage. An unauthenticated remote attacker can exploit this vulnerability to obtain the administrator\u2019s credential, resulting in performing arbitrary system operation or disrupt service." } ] }, @@ -76,8 +76,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-6957-d8f67-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-6957-d8f67-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-6957-d8f67-1.html" } ] }, diff --git a/2023/24xxx/CVE-2023-24839.json b/2023/24xxx/CVE-2023-24839.json index c186ed5c847..2ab48674e2f 100644 --- a/2023/24xxx/CVE-2023-24839.json +++ b/2023/24xxx/CVE-2023-24839.json @@ -44,7 +44,7 @@ "description_data": [ { "lang": "eng", - "value": "HGiga MailSherlock’s specific function has insufficient filtering for user input. An unauthenticated remote attacker can exploit this vulnerability to inject JavaScript, conducting a reflected XSS attack." + "value": "HGiga MailSherlock\u2019s specific function has insufficient filtering for user input. An unauthenticated remote attacker can exploit this vulnerability to inject JavaScript, conducting a reflected XSS attack." } ] }, @@ -82,8 +82,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-6958-e1a8e-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-6958-e1a8e-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-6958-e1a8e-1.html" } ] }, diff --git a/2023/24xxx/CVE-2023-24840.json b/2023/24xxx/CVE-2023-24840.json index 3372a397e3c..7041077c156 100644 --- a/2023/24xxx/CVE-2023-24840.json +++ b/2023/24xxx/CVE-2023-24840.json @@ -39,7 +39,7 @@ "description_data": [ { "lang": "eng", - "value": "HGiga MailSherlock mail query function has vulnerability of insufficient validation for user input. An authenticated remote attacker with administrator privilege can exploit this vulnerability to inject SQL commands to read, modify, and delete the database. " + "value": "HGiga MailSherlock mail query function has vulnerability of insufficient validation for user input. An authenticated remote attacker with administrator privilege can exploit this vulnerability to inject SQL commands to read, modify, and delete the database." } ] }, @@ -77,8 +77,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-6959-cdecb-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-6959-cdecb-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-6959-cdecb-1.html" } ] }, diff --git a/2023/24xxx/CVE-2023-24841.json b/2023/24xxx/CVE-2023-24841.json index fab4093e57f..f0a427455e4 100644 --- a/2023/24xxx/CVE-2023-24841.json +++ b/2023/24xxx/CVE-2023-24841.json @@ -77,8 +77,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-6960-fc2fe-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-6960-fc2fe-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-6960-fc2fe-1.html" } ] }, diff --git a/2023/24xxx/CVE-2023-24842.json b/2023/24xxx/CVE-2023-24842.json index 3ef53d9aa53..c65a369d696 100644 --- a/2023/24xxx/CVE-2023-24842.json +++ b/2023/24xxx/CVE-2023-24842.json @@ -44,7 +44,7 @@ "description_data": [ { "lang": "eng", - "value": "HGiga MailSherlock has vulnerability of insufficient access control. An unauthenticated remote user can exploit this vulnerability to access partial content of another user’s mail by changing user ID and mail ID within URL." + "value": "HGiga MailSherlock has vulnerability of insufficient access control. An unauthenticated remote user can exploit this vulnerability to access partial content of another user\u2019s mail by changing user ID and mail ID within URL." } ] }, @@ -82,8 +82,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-6961-12444-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-6961-12444-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-6961-12444-1.html" } ] }, diff --git a/2023/25xxx/CVE-2023-25017.json b/2023/25xxx/CVE-2023-25017.json index dcbd868b0d7..f30677ba758 100644 --- a/2023/25xxx/CVE-2023-25017.json +++ b/2023/25xxx/CVE-2023-25017.json @@ -76,8 +76,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-6962-34ac1-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-6962-34ac1-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-6962-34ac1-1.html" } ] }, diff --git a/2023/25xxx/CVE-2023-25018.json b/2023/25xxx/CVE-2023-25018.json index 82c9a676075..d2b2727393e 100644 --- a/2023/25xxx/CVE-2023-25018.json +++ b/2023/25xxx/CVE-2023-25018.json @@ -76,8 +76,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-6963-7d2ee-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-6963-7d2ee-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-6963-7d2ee-1.html" } ] }, diff --git a/2023/25xxx/CVE-2023-25909.json b/2023/25xxx/CVE-2023-25909.json index 91694506cfb..123063040d7 100644 --- a/2023/25xxx/CVE-2023-25909.json +++ b/2023/25xxx/CVE-2023-25909.json @@ -80,8 +80,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-6973-45872-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-6973-45872-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-6973-45872-1.html" } ] },