diff --git a/2021/42xxx/CVE-2021-42362.json b/2021/42xxx/CVE-2021-42362.json index 45d9114d108..4abe48d56a7 100644 --- a/2021/42xxx/CVE-2021-42362.json +++ b/2021/42xxx/CVE-2021-42362.json @@ -101,6 +101,11 @@ "refsource": "MISC", "url": "https://wpscan.com/vulnerability/bd4f157c-a3d7-4535-a587-0102ba4e3009", "name": "https://wpscan.com/vulnerability/bd4f157c-a3d7-4535-a587-0102ba4e3009" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/165376/WordPress-Popular-Posts-5.3.2-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/165376/WordPress-Popular-Posts-5.3.2-Remote-Code-Execution.html" } ] }, diff --git a/2021/44xxx/CVE-2021-44228.json b/2021/44xxx/CVE-2021-44228.json index 5be1a7bede6..32ba5577a80 100644 --- a/2021/44xxx/CVE-2021-44228.json +++ b/2021/44xxx/CVE-2021-44228.json @@ -278,6 +278,11 @@ "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html", + "url": "http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html" } ] },