mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 10:41:43 +00:00
38 lines
1.7 KiB
Markdown
38 lines
1.7 KiB
Markdown
![]() |
### [CVE-2010-2075](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2075)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
UnrealIRCd 3.2.8.1, as distributed on certain mirror sites from November 2009 through June 2010, contains an externally introduced modification (Trojan Horse) in the DEBUG3_DOLOG_SYSTEM macro, which allows remote attackers to execute arbitrary commands.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
No PoCs from references.
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/0bfxgh0st/cve-2010-2075
|
||
|
- https://github.com/0x48piraj/PwnHouse
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/CVEDB/PoC-List
|
||
|
- https://github.com/CVEDB/awesome-cve-repo
|
||
|
- https://github.com/FredBrave/CVE-2010-2075-UnrealIRCd-3.2.8.1
|
||
|
- https://github.com/Glumgam/UnrealiRCd-3.2.8.1-exploit-python
|
||
|
- https://github.com/JoseLRC97/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution
|
||
|
- https://github.com/MFernstrom/OffensivePascal-CVE-2010-2075
|
||
|
- https://github.com/Okarn/TP_securite_EDOU_JACQUEMONT
|
||
|
- https://github.com/Sh4dowX404/UnrealIRCD-3.2.8.1-Backdoor
|
||
|
- https://github.com/VoitenkoAN/13.1
|
||
|
- https://github.com/XorgX304/UnrealIRCd-3.2.8.1-RCE
|
||
|
- https://github.com/baoloc10/SoftwareSec-Metasploitable2
|
||
|
- https://github.com/chancej715/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution
|
||
|
- https://github.com/chancej715/chancej715
|
||
|
- https://github.com/jebidiah-anthony/htb_irked
|
||
|
- https://github.com/kevinpdicks/UnrealIRCD-3.2.8.1-RCE
|
||
|
- https://github.com/macosta-42/Exploit-Development
|
||
|
- https://github.com/marcocastro100/Intrusion_Detection_System-Python
|
||
|
- https://github.com/vmmaltsev/13.1
|
||
|
|