{"uuid": "7ff0147a-c7dc-49cf-80c8-2428fd91894d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37580", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/1197", "content": "#exploit\n1. CVE-2021-43617:\nBypass CRF\nhttps://github.com/kombat1/CVE-2021-43617\n\n2. Linux: UAF read: SO_PEERCRED\nand SO_PEERGROUPS race with listen() (and connect())\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=2230\n\n3. CVE-2021-37580:\nApache ShenYu 2.3.0/2.4.0 authentication bypass\nhttps://github.com/0x0021h/expbox/blob/main/cve-2021-37580-poc.py\n\n@BlueRedTeam", "creation_timestamp": "2021-11-20T06:56:13.000000Z"}