Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2010-2075
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
UnrealIRCd 3.2.8.1, as distributed on certain mirror sites from November 2009 through June 2010, contains an externally introduced modification (Trojan Horse) in the DEBUG3_DOLOG_SYSTEM macro, which allows remote attackers to execute arbitrary commands.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
UnrealIRCd 后门未授权访问漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
2009年11月到2010年6月间分布于某些镜面站点的UnrealIRCd,在DEBUG3_DOLOG_SYSTEM宏中包含外部引入的修改(特洛伊木马),远程攻击者可执行任意命令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2010-2075
#POC DescriptionSource LinkShenlong Link
1cve-2010-2075 https://github.com/XorgX304/UnrealIRCd-3.2.8.1-RCEPOC Details
2FreePascal implementation of the UnrealIRCD CVE-2010-2075https://github.com/MFernstrom/OffensivePascal-CVE-2010-2075POC Details
3UnrealIRCd 3.2.8.1 backdoor command execution exploit in Python 3 (CVE-2010-2075).https://github.com/chancej715/UnrealIRCd-3.2.8.1-Backdoor-Command-ExecutionPOC Details
4Exploit for CVE:2010-2075. This exploit allows remote command execution in UnrealIRCd 3.2.8.1.https://github.com/FredBrave/CVE-2010-2075-UnrealIRCd-3.2.8.1POC Details
5Script that exploits the vulnerability that allows establishing a backdoor in the UnrealIRCd service with CVE-2010-2075https://github.com/JoseLRC97/UnrealIRCd-3.2.8.1-Backdoor-Command-ExecutionPOC Details
6The UnrealIRCd 3.2.8.1 Backdoor is associated with CVE-2010-2075, a well-known vulnerability that was introduced when the source code of the UnrealIRCd software was compromised.https://github.com/nwclasantha/unreal_ircd_3281_backdoor_and_mitigationPOC Details
7I recently set up a small Penetration Testing Lab to get some hands-on experience with vulnerability scanning and exploitation. Using Nessus and Kali Linux, I was able to dive into Metasploitable 2, a deliberately vulnerable system, and identify a pretty serious flaw (CVE-2010-2075).https://github.com/abhinavcybersec/PenTest-LabPOC Details
8I recently set up a small Penetration Testing Lab to get some hands-on experience with vulnerability scanning and exploitation. Using Nessus and Kali Linux, I was able to dive into Metasploitable 2, a deliberately vulnerable system, and identify a pretty serious flaw (CVE-2010-2075).https://github.com/abhinavsinghx/PenTest-LabPOC Details
9CVE-2010-2075https://github.com/earthbendergara/unrealircd3.2.8.1-local-exploitPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2010-2075
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2010-2075

No comments yet


Leave a comment