PoC-in-GitHub/2010/CVE-2010-2075.json
2025-03-09 03:31:39 +09:00

157 lines
No EOL
6 KiB
JSON

[
{
"id": 497194997,
"name": "OffensivePascal-CVE-2010-2075",
"full_name": "MFernstrom\/OffensivePascal-CVE-2010-2075",
"owner": {
"login": "MFernstrom",
"id": 9220603,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9220603?v=4",
"html_url": "https:\/\/github.com\/MFernstrom",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MFernstrom\/OffensivePascal-CVE-2010-2075",
"description": "FreePascal implementation of the UnrealIRCD CVE-2010-2075",
"fork": false,
"created_at": "2022-05-28T02:47:22Z",
"updated_at": "2024-09-06T01:25:16Z",
"pushed_at": "2022-05-29T18:04:45Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 632273864,
"name": "UnrealIRCd-3.2.8.1-Backdoor-Command-Execution",
"full_name": "chancej715\/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution",
"owner": {
"login": "chancej715",
"id": 57548476,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57548476?v=4",
"html_url": "https:\/\/github.com\/chancej715",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/chancej715\/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution",
"description": "UnrealIRCd 3.2.8.1 backdoor command execution exploit in Python 3 (CVE-2010-2075).",
"fork": false,
"created_at": "2023-04-25T04:30:36Z",
"updated_at": "2023-04-25T21:10:56Z",
"pushed_at": "2023-04-25T21:11:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 647970703,
"name": "CVE-2010-2075-UnrealIRCd-3.2.8.1",
"full_name": "FredBrave\/CVE-2010-2075-UnrealIRCd-3.2.8.1",
"owner": {
"login": "FredBrave",
"id": 114189847,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114189847?v=4",
"html_url": "https:\/\/github.com\/FredBrave",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/FredBrave\/CVE-2010-2075-UnrealIRCd-3.2.8.1",
"description": "Exploit for CVE:2010-2075. This exploit allows remote command execution in UnrealIRCd 3.2.8.1.",
"fork": false,
"created_at": "2023-05-31T23:35:17Z",
"updated_at": "2023-05-31T23:40:58Z",
"pushed_at": "2023-05-31T23:44:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 788614854,
"name": "UnrealIRCd-3.2.8.1-Backdoor-Command-Execution",
"full_name": "JoseLRC97\/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution",
"owner": {
"login": "JoseLRC97",
"id": 56311988,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56311988?v=4",
"html_url": "https:\/\/github.com\/JoseLRC97",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/JoseLRC97\/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution",
"description": "Script that exploits the vulnerability that allows establishing a backdoor in the UnrealIRCd service with CVE-2010-2075",
"fork": false,
"created_at": "2024-04-18T18:55:27Z",
"updated_at": "2024-04-18T18:58:51Z",
"pushed_at": "2024-04-18T18:59:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 939076767,
"name": "PenTest-Lab",
"full_name": "abhinavcybersec\/PenTest-Lab",
"owner": {
"login": "abhinavcybersec",
"id": 168777920,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168777920?v=4",
"html_url": "https:\/\/github.com\/abhinavcybersec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/abhinavcybersec\/PenTest-Lab",
"description": "I recently set up a small Penetration Testing Lab to get some hands-on experience with vulnerability scanning and exploitation. Using Nessus and Kali Linux, I was able to dive into Metasploitable 2, a deliberately vulnerable system, and identify a pretty serious flaw (CVE-2010-2075).",
"fork": false,
"created_at": "2025-02-26T00:31:00Z",
"updated_at": "2025-02-27T23:18:38Z",
"pushed_at": "2025-02-27T23:09:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]