diff --git a/2018/7xxx/CVE-2018-7101.json b/2018/7xxx/CVE-2018-7101.json index bd689fbb9d6..b3fe8de0195 100644 --- a/2018/7xxx/CVE-2018-7101.json +++ b/2018/7xxx/CVE-2018-7101.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03875en_us", + "refsource" : "CONFIRM", "url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03875en_us" } ] diff --git a/2018/7xxx/CVE-2018-7102.json b/2018/7xxx/CVE-2018-7102.json index 1bcafec1753..aadb5430970 100644 --- a/2018/7xxx/CVE-2018-7102.json +++ b/2018/7xxx/CVE-2018-7102.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03887en_us", + "refsource" : "CONFIRM", "url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03887en_us" } ] diff --git a/2018/7xxx/CVE-2018-7103.json b/2018/7xxx/CVE-2018-7103.json index 2d8ac07801b..21c1ed8934d 100644 --- a/2018/7xxx/CVE-2018-7103.json +++ b/2018/7xxx/CVE-2018-7103.json @@ -34,7 +34,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "A Remote Code Execution vulnerability was identified in HPE Intelligent Management Center (iMC) Wireless Services Manager Software earlier than version IMC WSM 7.3 E0506P02 ." + "value" : "A Remote Code Execution vulnerability was identified in HPE Intelligent Management Center (iMC) Wireless Services Manager Software earlier than version IMC WSM 7.3 E0506P02." } ] }, @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03893en_us", + "refsource" : "CONFIRM", "url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03893en_us" } ] diff --git a/2018/7xxx/CVE-2018-7104.json b/2018/7xxx/CVE-2018-7104.json index c2ae2653002..7e043e9fe36 100644 --- a/2018/7xxx/CVE-2018-7104.json +++ b/2018/7xxx/CVE-2018-7104.json @@ -34,7 +34,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "A Remote Code Execution vulnerability was identified in HPE Intelligent Management Center (iMC) Wireless Services Manager Software earlier than version IMC WSM 7.3 E0506P02 ." + "value" : "A Remote Code Execution vulnerability was identified in HPE Intelligent Management Center (iMC) Wireless Services Manager Software earlier than version IMC WSM 7.3 E0506P02." } ] }, @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03893en_us", + "refsource" : "CONFIRM", "url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03893en_us" } ] diff --git a/2018/7xxx/CVE-2018-7105.json b/2018/7xxx/CVE-2018-7105.json index 09268c28e49..67c1578bea4 100644 --- a/2018/7xxx/CVE-2018-7105.json +++ b/2018/7xxx/CVE-2018-7105.json @@ -34,7 +34,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "A security vulnerability inHPE Integrated Lights-Out 5 (iLO 5) for HPE Gen10 Servers prior to v1.35, HPE Integrated Lights-Out 4 (iLO 4) prior to v2.61, HPE Integrated Lights-Out 3 (iLO 3) prior to v1.90 could be remotely exploited to execute arbitrary code." + "value" : "A security vulnerability in HPE Integrated Lights-Out 5 (iLO 5) for HPE Gen10 Servers prior to v1.35, HPE Integrated Lights-Out 4 (iLO 4) prior to v2.61, HPE Integrated Lights-Out 3 (iLO 3) prior to v1.90 could be remotely exploited to execute arbitrary code." } ] }, @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03866en_us", + "refsource" : "CONFIRM", "url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03866en_us" } ] diff --git a/2018/7xxx/CVE-2018-7106.json b/2018/7xxx/CVE-2018-7106.json index f811f3742d6..74cf6001aef 100644 --- a/2018/7xxx/CVE-2018-7106.json +++ b/2018/7xxx/CVE-2018-7106.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03866en_us", + "refsource" : "CONFIRM", "url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03866en_us" } ] diff --git a/2018/7xxx/CVE-2018-7107.json b/2018/7xxx/CVE-2018-7107.json index f88d96105a0..9a8894d9c0b 100644 --- a/2018/7xxx/CVE-2018-7107.json +++ b/2018/7xxx/CVE-2018-7107.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03889en_us", + "refsource" : "CONFIRM", "url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03889en_us" } ] diff --git a/2018/7xxx/CVE-2018-7108.json b/2018/7xxx/CVE-2018-7108.json index 2eafd0faec5..d9fd940c41b 100644 --- a/2018/7xxx/CVE-2018-7108.json +++ b/2018/7xxx/CVE-2018-7108.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03879en_us", + "refsource" : "CONFIRM", "url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03879en_us" } ] diff --git a/2018/7xxx/CVE-2018-7109.json b/2018/7xxx/CVE-2018-7109.json index beafb9a96e7..e3e2dc3eaca 100644 --- a/2018/7xxx/CVE-2018-7109.json +++ b/2018/7xxx/CVE-2018-7109.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03896en_us", + "refsource" : "CONFIRM", "url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03896en_us" } ]