From ace35993db479381a87d921f0cfe2f8ba9f24f8d Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 27 Sep 2018 14:03:49 -0400 Subject: [PATCH] - Synchronized data. --- 2018/7xxx/CVE-2018-7101.json | 2 ++ 2018/7xxx/CVE-2018-7102.json | 2 ++ 2018/7xxx/CVE-2018-7103.json | 4 +++- 2018/7xxx/CVE-2018-7104.json | 4 +++- 2018/7xxx/CVE-2018-7105.json | 4 +++- 2018/7xxx/CVE-2018-7106.json | 2 ++ 2018/7xxx/CVE-2018-7107.json | 2 ++ 2018/7xxx/CVE-2018-7108.json | 2 ++ 2018/7xxx/CVE-2018-7109.json | 2 ++ 9 files changed, 21 insertions(+), 3 deletions(-) diff --git a/2018/7xxx/CVE-2018-7101.json b/2018/7xxx/CVE-2018-7101.json index bd689fbb9d6..b3fe8de0195 100644 --- a/2018/7xxx/CVE-2018-7101.json +++ b/2018/7xxx/CVE-2018-7101.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03875en_us", + "refsource" : "CONFIRM", "url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03875en_us" } ] diff --git a/2018/7xxx/CVE-2018-7102.json b/2018/7xxx/CVE-2018-7102.json index 1bcafec1753..aadb5430970 100644 --- a/2018/7xxx/CVE-2018-7102.json +++ b/2018/7xxx/CVE-2018-7102.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03887en_us", + "refsource" : "CONFIRM", "url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03887en_us" } ] diff --git a/2018/7xxx/CVE-2018-7103.json b/2018/7xxx/CVE-2018-7103.json index 2d8ac07801b..21c1ed8934d 100644 --- a/2018/7xxx/CVE-2018-7103.json +++ b/2018/7xxx/CVE-2018-7103.json @@ -34,7 +34,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "A Remote Code Execution vulnerability was identified in HPE Intelligent Management Center (iMC) Wireless Services Manager Software earlier than version IMC WSM 7.3 E0506P02 ." + "value" : "A Remote Code Execution vulnerability was identified in HPE Intelligent Management Center (iMC) Wireless Services Manager Software earlier than version IMC WSM 7.3 E0506P02." } ] }, @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03893en_us", + "refsource" : "CONFIRM", "url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03893en_us" } ] diff --git a/2018/7xxx/CVE-2018-7104.json b/2018/7xxx/CVE-2018-7104.json index c2ae2653002..7e043e9fe36 100644 --- a/2018/7xxx/CVE-2018-7104.json +++ b/2018/7xxx/CVE-2018-7104.json @@ -34,7 +34,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "A Remote Code Execution vulnerability was identified in HPE Intelligent Management Center (iMC) Wireless Services Manager Software earlier than version IMC WSM 7.3 E0506P02 ." + "value" : "A Remote Code Execution vulnerability was identified in HPE Intelligent Management Center (iMC) Wireless Services Manager Software earlier than version IMC WSM 7.3 E0506P02." } ] }, @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03893en_us", + "refsource" : "CONFIRM", "url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03893en_us" } ] diff --git a/2018/7xxx/CVE-2018-7105.json b/2018/7xxx/CVE-2018-7105.json index 09268c28e49..67c1578bea4 100644 --- a/2018/7xxx/CVE-2018-7105.json +++ b/2018/7xxx/CVE-2018-7105.json @@ -34,7 +34,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "A security vulnerability inHPE Integrated Lights-Out 5 (iLO 5) for HPE Gen10 Servers prior to v1.35, HPE Integrated Lights-Out 4 (iLO 4) prior to v2.61, HPE Integrated Lights-Out 3 (iLO 3) prior to v1.90 could be remotely exploited to execute arbitrary code." + "value" : "A security vulnerability in HPE Integrated Lights-Out 5 (iLO 5) for HPE Gen10 Servers prior to v1.35, HPE Integrated Lights-Out 4 (iLO 4) prior to v2.61, HPE Integrated Lights-Out 3 (iLO 3) prior to v1.90 could be remotely exploited to execute arbitrary code." } ] }, @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03866en_us", + "refsource" : "CONFIRM", "url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03866en_us" } ] diff --git a/2018/7xxx/CVE-2018-7106.json b/2018/7xxx/CVE-2018-7106.json index f811f3742d6..74cf6001aef 100644 --- a/2018/7xxx/CVE-2018-7106.json +++ b/2018/7xxx/CVE-2018-7106.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03866en_us", + "refsource" : "CONFIRM", "url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03866en_us" } ] diff --git a/2018/7xxx/CVE-2018-7107.json b/2018/7xxx/CVE-2018-7107.json index f88d96105a0..9a8894d9c0b 100644 --- a/2018/7xxx/CVE-2018-7107.json +++ b/2018/7xxx/CVE-2018-7107.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03889en_us", + "refsource" : "CONFIRM", "url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03889en_us" } ] diff --git a/2018/7xxx/CVE-2018-7108.json b/2018/7xxx/CVE-2018-7108.json index 2eafd0faec5..d9fd940c41b 100644 --- a/2018/7xxx/CVE-2018-7108.json +++ b/2018/7xxx/CVE-2018-7108.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03879en_us", + "refsource" : "CONFIRM", "url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03879en_us" } ] diff --git a/2018/7xxx/CVE-2018-7109.json b/2018/7xxx/CVE-2018-7109.json index beafb9a96e7..e3e2dc3eaca 100644 --- a/2018/7xxx/CVE-2018-7109.json +++ b/2018/7xxx/CVE-2018-7109.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03896en_us", + "refsource" : "CONFIRM", "url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03896en_us" } ]