PoC-in-GitHub/2010/CVE-2010-2075.json
2024-10-22 21:31:43 +09:00

126 lines
No EOL
4.7 KiB
JSON

[
{
"id": 497194997,
"name": "OffensivePascal-CVE-2010-2075",
"full_name": "MFernstrom\/OffensivePascal-CVE-2010-2075",
"owner": {
"login": "MFernstrom",
"id": 9220603,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9220603?v=4",
"html_url": "https:\/\/github.com\/MFernstrom",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MFernstrom\/OffensivePascal-CVE-2010-2075",
"description": "FreePascal implementation of the UnrealIRCD CVE-2010-2075",
"fork": false,
"created_at": "2022-05-28T02:47:22Z",
"updated_at": "2024-09-06T01:25:16Z",
"pushed_at": "2022-05-29T18:04:45Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 2
},
{
"id": 632273864,
"name": "UnrealIRCd-3.2.8.1-Backdoor-Command-Execution",
"full_name": "chancej715\/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution",
"owner": {
"login": "chancej715",
"id": 57548476,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57548476?v=4",
"html_url": "https:\/\/github.com\/chancej715",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/chancej715\/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution",
"description": "UnrealIRCd 3.2.8.1 backdoor command execution exploit in Python 3 (CVE-2010-2075).",
"fork": false,
"created_at": "2023-04-25T04:30:36Z",
"updated_at": "2023-04-25T21:10:56Z",
"pushed_at": "2023-04-25T21:11:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 647970703,
"name": "CVE-2010-2075-UnrealIRCd-3.2.8.1",
"full_name": "FredBrave\/CVE-2010-2075-UnrealIRCd-3.2.8.1",
"owner": {
"login": "FredBrave",
"id": 114189847,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114189847?v=4",
"html_url": "https:\/\/github.com\/FredBrave",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/FredBrave\/CVE-2010-2075-UnrealIRCd-3.2.8.1",
"description": "Exploit for CVE:2010-2075. This exploit allows remote command execution in UnrealIRCd 3.2.8.1.",
"fork": false,
"created_at": "2023-05-31T23:35:17Z",
"updated_at": "2023-05-31T23:40:58Z",
"pushed_at": "2023-05-31T23:44:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 788614854,
"name": "UnrealIRCd-3.2.8.1-Backdoor-Command-Execution",
"full_name": "JoseLRC97\/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution",
"owner": {
"login": "JoseLRC97",
"id": 56311988,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56311988?v=4",
"html_url": "https:\/\/github.com\/JoseLRC97",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/JoseLRC97\/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution",
"description": "Script that exploits the vulnerability that allows establishing a backdoor in the UnrealIRCd service with CVE-2010-2075",
"fork": false,
"created_at": "2024-04-18T18:55:27Z",
"updated_at": "2024-04-18T18:58:51Z",
"pushed_at": "2024-04-18T18:59:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]