[ { "id": 497194997, "name": "OffensivePascal-CVE-2010-2075", "full_name": "MFernstrom\/OffensivePascal-CVE-2010-2075", "owner": { "login": "MFernstrom", "id": 9220603, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9220603?v=4", "html_url": "https:\/\/github.com\/MFernstrom", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/MFernstrom\/OffensivePascal-CVE-2010-2075", "description": "FreePascal implementation of the UnrealIRCD CVE-2010-2075", "fork": false, "created_at": "2022-05-28T02:47:22Z", "updated_at": "2024-09-06T01:25:16Z", "pushed_at": "2022-05-29T18:04:45Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 2 }, { "id": 632273864, "name": "UnrealIRCd-3.2.8.1-Backdoor-Command-Execution", "full_name": "chancej715\/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution", "owner": { "login": "chancej715", "id": 57548476, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57548476?v=4", "html_url": "https:\/\/github.com\/chancej715", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/chancej715\/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution", "description": "UnrealIRCd 3.2.8.1 backdoor command execution exploit in Python 3 (CVE-2010-2075).", "fork": false, "created_at": "2023-04-25T04:30:36Z", "updated_at": "2023-04-25T21:10:56Z", "pushed_at": "2023-04-25T21:11:35Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 647970703, "name": "CVE-2010-2075-UnrealIRCd-3.2.8.1", "full_name": "FredBrave\/CVE-2010-2075-UnrealIRCd-3.2.8.1", "owner": { "login": "FredBrave", "id": 114189847, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114189847?v=4", "html_url": "https:\/\/github.com\/FredBrave", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/FredBrave\/CVE-2010-2075-UnrealIRCd-3.2.8.1", "description": "Exploit for CVE:2010-2075. This exploit allows remote command execution in UnrealIRCd 3.2.8.1.", "fork": false, "created_at": "2023-05-31T23:35:17Z", "updated_at": "2023-05-31T23:40:58Z", "pushed_at": "2023-05-31T23:44:37Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 788614854, "name": "UnrealIRCd-3.2.8.1-Backdoor-Command-Execution", "full_name": "JoseLRC97\/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution", "owner": { "login": "JoseLRC97", "id": 56311988, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56311988?v=4", "html_url": "https:\/\/github.com\/JoseLRC97", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/JoseLRC97\/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution", "description": "Script that exploits the vulnerability that allows establishing a backdoor in the UnrealIRCd service with CVE-2010-2075", "fork": false, "created_at": "2024-04-18T18:55:27Z", "updated_at": "2024-04-18T18:58:51Z", "pushed_at": "2024-04-18T18:59:13Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 } ]