PoC-in-GitHub/2010/CVE-2010-2075.json

157 lines
5.9 KiB
JSON
Raw Normal View History

2023-06-19 17:13:15 +09:00
[
{
"id": 497194997,
"name": "OffensivePascal-CVE-2010-2075",
"full_name": "MFernstrom\/OffensivePascal-CVE-2010-2075",
"owner": {
"login": "MFernstrom",
"id": 9220603,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9220603?v=4",
2024-10-18 09:30:24 +09:00
"html_url": "https:\/\/github.com\/MFernstrom",
"user_view_type": "public"
2023-06-19 17:13:15 +09:00
},
"html_url": "https:\/\/github.com\/MFernstrom\/OffensivePascal-CVE-2010-2075",
"description": "FreePascal implementation of the UnrealIRCD CVE-2010-2075",
"fork": false,
"created_at": "2022-05-28T02:47:22Z",
2024-09-06 15:29:52 +09:00
"updated_at": "2024-09-06T01:25:16Z",
2023-06-19 17:13:15 +09:00
"pushed_at": "2022-05-29T18:04:45Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
2023-12-19 15:49:02 +09:00
"forks_count": 0,
2023-06-19 17:13:15 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2023-12-19 15:49:02 +09:00
"forks": 0,
2023-06-19 17:13:15 +09:00
"watchers": 2,
2023-06-19 22:46:37 +09:00
"score": 0,
"subscribers_count": 2
2023-06-19 17:13:15 +09:00
},
{
"id": 632273864,
"name": "UnrealIRCd-3.2.8.1-Backdoor-Command-Execution",
"full_name": "chancej715\/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution",
"owner": {
"login": "chancej715",
"id": 57548476,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57548476?v=4",
2024-10-18 09:30:24 +09:00
"html_url": "https:\/\/github.com\/chancej715",
"user_view_type": "public"
2023-06-19 17:13:15 +09:00
},
"html_url": "https:\/\/github.com\/chancej715\/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution",
"description": "UnrealIRCd 3.2.8.1 backdoor command execution exploit in Python 3 (CVE-2010-2075).",
"fork": false,
"created_at": "2023-04-25T04:30:36Z",
"updated_at": "2023-04-25T21:10:56Z",
"pushed_at": "2023-04-25T21:11:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
2024-01-26 03:32:03 +09:00
"forks_count": 1,
2023-06-19 17:13:15 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-01-26 03:32:03 +09:00
"forks": 1,
2023-06-19 17:13:15 +09:00
"watchers": 0,
2023-06-19 22:46:37 +09:00
"score": 0,
"subscribers_count": 1
2023-06-19 17:13:15 +09:00
},
{
"id": 647970703,
"name": "CVE-2010-2075-UnrealIRCd-3.2.8.1",
"full_name": "FredBrave\/CVE-2010-2075-UnrealIRCd-3.2.8.1",
"owner": {
"login": "FredBrave",
"id": 114189847,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114189847?v=4",
2024-10-18 09:30:24 +09:00
"html_url": "https:\/\/github.com\/FredBrave",
"user_view_type": "public"
2023-06-19 17:13:15 +09:00
},
"html_url": "https:\/\/github.com\/FredBrave\/CVE-2010-2075-UnrealIRCd-3.2.8.1",
"description": "Exploit for CVE:2010-2075. This exploit allows remote command execution in UnrealIRCd 3.2.8.1.",
"fork": false,
"created_at": "2023-05-31T23:35:17Z",
"updated_at": "2023-05-31T23:40:58Z",
"pushed_at": "2023-05-31T23:44:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
2023-06-19 22:46:37 +09:00
"score": 0,
"subscribers_count": 1
2024-04-19 09:31:05 +09:00
},
{
"id": 788614854,
"name": "UnrealIRCd-3.2.8.1-Backdoor-Command-Execution",
"full_name": "JoseLRC97\/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution",
"owner": {
"login": "JoseLRC97",
"id": 56311988,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56311988?v=4",
2024-10-18 09:30:24 +09:00
"html_url": "https:\/\/github.com\/JoseLRC97",
"user_view_type": "public"
2024-04-19 09:31:05 +09:00
},
"html_url": "https:\/\/github.com\/JoseLRC97\/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution",
"description": "Script that exploits the vulnerability that allows establishing a backdoor in the UnrealIRCd service with CVE-2010-2075",
"fork": false,
"created_at": "2024-04-18T18:55:27Z",
"updated_at": "2024-04-18T18:58:51Z",
"pushed_at": "2024-04-18T18:59:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2024-04-20 03:32:19 +09:00
"subscribers_count": 1
2024-10-17 21:31:32 +09:00
},
{
"id": 874159698,
"name": "unreal_ircd_3281_backdoor_and_mitigation",
"full_name": "nwclasantha\/unreal_ircd_3281_backdoor_and_mitigation",
"owner": {
"login": "nwclasantha",
"id": 48653609,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48653609?v=4",
2024-10-18 09:30:24 +09:00
"html_url": "https:\/\/github.com\/nwclasantha",
"user_view_type": "public"
2024-10-17 21:31:32 +09:00
},
"html_url": "https:\/\/github.com\/nwclasantha\/unreal_ircd_3281_backdoor_and_mitigation",
"description": "The UnrealIRCd 3.2.8.1 Backdoor is associated with CVE-2010-2075, a well-known vulnerability that was introduced when the source code of the UnrealIRCd software was compromised.",
"fork": false,
"created_at": "2024-10-17T10:59:25Z",
"updated_at": "2024-10-17T11:18:24Z",
"pushed_at": "2024-10-17T11:18:13Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
2024-10-18 03:30:56 +09:00
"subscribers_count": 1
2023-06-19 17:13:15 +09:00
}
]