### [CVE-2021-20231](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20231) ![](https://img.shields.io/static/v1?label=Product&message=gnutls&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=gnutls%203.7.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-416&color=brightgreen) ### Description A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and other consequences. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/AniketKumar090/Tyk-Vulnerability-Scanner - https://github.com/Azure/publish-security-assessments - https://github.com/GitHubForSnap/ssmtp-gael - https://github.com/actions-marketplace-validations/Azure_publish-security-assessments - https://github.com/epequeno/devops-demo - https://github.com/onzack/trivy-multiscanner