{"uuid": "4f98e8b9-f54d-42c4-8389-b8280b1a1b3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-37580", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/4790", "content": "#exploit\n1. CVE-2021-43617:\nBypass CRF\nhttps://github.com/kombat1/CVE-2021-43617\n\n2. Linux: UAF read: SO_PEERCRED\nand SO_PEERGROUPS race with listen() (and connect())\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=2230\n\n3. CVE-2021-37580:\nApache ShenYu 2.3.0/2.4.0 authentication bypass\nhttps://github.com/0x0021h/expbox/blob/main/cve-2021-37580-poc.py", "creation_timestamp": "2021-11-20T13:55:25.000000Z"}