Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | cve-2010-2075 | https://github.com/XorgX304/UnrealIRCd-3.2.8.1-RCE | POC Details |
| 2 | FreePascal implementation of the UnrealIRCD CVE-2010-2075 | https://github.com/MFernstrom/OffensivePascal-CVE-2010-2075 | POC Details |
| 3 | UnrealIRCd 3.2.8.1 backdoor command execution exploit in Python 3 (CVE-2010-2075). | https://github.com/chancej715/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution | POC Details |
| 4 | Exploit for CVE:2010-2075. This exploit allows remote command execution in UnrealIRCd 3.2.8.1. | https://github.com/FredBrave/CVE-2010-2075-UnrealIRCd-3.2.8.1 | POC Details |
| 5 | Script that exploits the vulnerability that allows establishing a backdoor in the UnrealIRCd service with CVE-2010-2075 | https://github.com/JoseLRC97/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution | POC Details |
| 6 | The UnrealIRCd 3.2.8.1 Backdoor is associated with CVE-2010-2075, a well-known vulnerability that was introduced when the source code of the UnrealIRCd software was compromised. | https://github.com/nwclasantha/unreal_ircd_3281_backdoor_and_mitigation | POC Details |
| 7 | I recently set up a small Penetration Testing Lab to get some hands-on experience with vulnerability scanning and exploitation. Using Nessus and Kali Linux, I was able to dive into Metasploitable 2, a deliberately vulnerable system, and identify a pretty serious flaw (CVE-2010-2075). | https://github.com/abhinavcybersec/PenTest-Lab | POC Details |
| 8 | I recently set up a small Penetration Testing Lab to get some hands-on experience with vulnerability scanning and exploitation. Using Nessus and Kali Linux, I was able to dive into Metasploitable 2, a deliberately vulnerable system, and identify a pretty serious flaw (CVE-2010-2075). | https://github.com/abhinavsinghx/PenTest-Lab | POC Details |
| 9 | CVE-2010-2075 | https://github.com/earthbendergara/unrealircd3.2.8.1-local-exploit | POC Details |
No public POC found.
Login to generate AI POCNo comments yet