mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-30 18:56:19 +00:00
2.3 KiB
2.3 KiB
CVE-2021-37580
Description
A flaw was found in Apache ShenYu Admin. The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication. This issue affected Apache ShenYu 2.3.0 and 2.4.0
POC
Reference
No PoCs from references.
Github
- https://github.com/0day404/vulnerability-poc
- https://github.com/0x0021h/expbox
- https://github.com/20142995/pocsuite3
- https://github.com/20142995/sectool
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/ArrestX/--POC
- https://github.com/CN016/Apache-ShenYu-Admin-JWT-CVE-2021-37580-
- https://github.com/Ilovewomen/db_script_v2
- https://github.com/Ilovewomen/db_script_v2_2
- https://github.com/KayCHENvip/vulnerability-poc
- https://github.com/Li468446/Apache_ShenYu_Admin
- https://github.com/Liang2580/CVE-2021-37580
- https://github.com/Miraitowa70/POC-Notes
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/Osyanina/westone-CVE-2021-37580-scanner
- https://github.com/Threekiii/Awesome-POC
- https://github.com/Wing-song/CVE-2021-37580
- https://github.com/ZororoZ/CVE-2021-37580
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/fengwenhua/CVE-2021-37580
- https://github.com/githublihaha/vul
- https://github.com/huimzjty/vulwiki
- https://github.com/langligelang/langligelang
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/merlinepedra25/AttackWebFrameworkTools-5.0
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/pen4uin/vulnerability-research
- https://github.com/pen4uin/vulnerability-research-list
- https://github.com/rabbitsafe/CVE-2021-37580
- https://github.com/soosmile/POC
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC