2023-06-19 17:13:15 +09:00
[
{
"id" : 497194997 ,
"name" : "OffensivePascal-CVE-2010-2075" ,
"full_name" : "MFernstrom\/OffensivePascal-CVE-2010-2075" ,
"owner" : {
"login" : "MFernstrom" ,
"id" : 9220603 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/9220603?v=4" ,
2024-10-18 09:30:24 +09:00
"html_url" : "https:\/\/github.com\/MFernstrom" ,
"user_view_type" : "public"
2023-06-19 17:13:15 +09:00
} ,
"html_url" : "https:\/\/github.com\/MFernstrom\/OffensivePascal-CVE-2010-2075" ,
"description" : "FreePascal implementation of the UnrealIRCD CVE-2010-2075" ,
"fork" : false ,
"created_at" : "2022-05-28T02:47:22Z" ,
2024-09-06 15:29:52 +09:00
"updated_at" : "2024-09-06T01:25:16Z" ,
2023-06-19 17:13:15 +09:00
"pushed_at" : "2022-05-29T18:04:45Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
2023-12-19 15:49:02 +09:00
"forks_count" : 0 ,
2023-06-19 17:13:15 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-12-19 15:49:02 +09:00
"forks" : 0 ,
2023-06-19 17:13:15 +09:00
"watchers" : 2 ,
2023-06-19 22:46:37 +09:00
"score" : 0 ,
"subscribers_count" : 2
2023-06-19 17:13:15 +09:00
} ,
{
"id" : 632273864 ,
"name" : "UnrealIRCd-3.2.8.1-Backdoor-Command-Execution" ,
"full_name" : "chancej715\/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution" ,
"owner" : {
"login" : "chancej715" ,
"id" : 57548476 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/57548476?v=4" ,
2024-10-18 09:30:24 +09:00
"html_url" : "https:\/\/github.com\/chancej715" ,
"user_view_type" : "public"
2023-06-19 17:13:15 +09:00
} ,
"html_url" : "https:\/\/github.com\/chancej715\/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution" ,
"description" : "UnrealIRCd 3.2.8.1 backdoor command execution exploit in Python 3 (CVE-2010-2075)." ,
"fork" : false ,
"created_at" : "2023-04-25T04:30:36Z" ,
"updated_at" : "2023-04-25T21:10:56Z" ,
"pushed_at" : "2023-04-25T21:11:35Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
2024-01-26 03:32:03 +09:00
"forks_count" : 1 ,
2023-06-19 17:13:15 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-01-26 03:32:03 +09:00
"forks" : 1 ,
2023-06-19 17:13:15 +09:00
"watchers" : 0 ,
2023-06-19 22:46:37 +09:00
"score" : 0 ,
"subscribers_count" : 1
2023-06-19 17:13:15 +09:00
} ,
{
"id" : 647970703 ,
"name" : "CVE-2010-2075-UnrealIRCd-3.2.8.1" ,
"full_name" : "FredBrave\/CVE-2010-2075-UnrealIRCd-3.2.8.1" ,
"owner" : {
"login" : "FredBrave" ,
"id" : 114189847 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/114189847?v=4" ,
2024-10-18 09:30:24 +09:00
"html_url" : "https:\/\/github.com\/FredBrave" ,
"user_view_type" : "public"
2023-06-19 17:13:15 +09:00
} ,
"html_url" : "https:\/\/github.com\/FredBrave\/CVE-2010-2075-UnrealIRCd-3.2.8.1" ,
"description" : "Exploit for CVE:2010-2075. This exploit allows remote command execution in UnrealIRCd 3.2.8.1." ,
"fork" : false ,
"created_at" : "2023-05-31T23:35:17Z" ,
"updated_at" : "2023-05-31T23:40:58Z" ,
"pushed_at" : "2023-05-31T23:44:37Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
2023-06-19 22:46:37 +09:00
"score" : 0 ,
"subscribers_count" : 1
2024-04-19 09:31:05 +09:00
} ,
{
"id" : 788614854 ,
"name" : "UnrealIRCd-3.2.8.1-Backdoor-Command-Execution" ,
"full_name" : "JoseLRC97\/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution" ,
"owner" : {
"login" : "JoseLRC97" ,
"id" : 56311988 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/56311988?v=4" ,
2024-10-18 09:30:24 +09:00
"html_url" : "https:\/\/github.com\/JoseLRC97" ,
"user_view_type" : "public"
2024-04-19 09:31:05 +09:00
} ,
"html_url" : "https:\/\/github.com\/JoseLRC97\/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution" ,
"description" : "Script that exploits the vulnerability that allows establishing a backdoor in the UnrealIRCd service with CVE-2010-2075" ,
"fork" : false ,
"created_at" : "2024-04-18T18:55:27Z" ,
"updated_at" : "2024-04-18T18:58:51Z" ,
"pushed_at" : "2024-04-18T18:59:13Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
2024-04-20 03:32:19 +09:00
"subscribers_count" : 1
2024-10-17 21:31:32 +09:00
} ,
{
"id" : 874159698 ,
"name" : "unreal_ircd_3281_backdoor_and_mitigation" ,
"full_name" : "nwclasantha\/unreal_ircd_3281_backdoor_and_mitigation" ,
"owner" : {
"login" : "nwclasantha" ,
"id" : 48653609 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/48653609?v=4" ,
2024-10-18 09:30:24 +09:00
"html_url" : "https:\/\/github.com\/nwclasantha" ,
"user_view_type" : "public"
2024-10-17 21:31:32 +09:00
} ,
"html_url" : "https:\/\/github.com\/nwclasantha\/unreal_ircd_3281_backdoor_and_mitigation" ,
"description" : "The UnrealIRCd 3.2.8.1 Backdoor is associated with CVE-2010-2075, a well-known vulnerability that was introduced when the source code of the UnrealIRCd software was compromised." ,
"fork" : false ,
"created_at" : "2024-10-17T10:59:25Z" ,
2024-10-18 21:31:14 +09:00
"updated_at" : "2024-10-18T06:52:11Z" ,
2024-10-17 21:31:32 +09:00
"pushed_at" : "2024-10-17T11:18:13Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
2024-10-18 03:30:56 +09:00
"subscribers_count" : 1
2023-06-19 17:13:15 +09:00
}
]