3.8 KiB
3.8 KiB
CVE-2010-2075
Description
UnrealIRCd 3.2.8.1, as distributed on certain mirror sites from November 2009 through June 2010, contains an externally introduced modification (Trojan Horse) in the DEBUG3_DOLOG_SYSTEM macro, which allows remote attackers to execute arbitrary commands.
POC
Reference
No PoCs from references.
Github
- https://github.com/0bfxgh0st/cve-2010-2075
- https://github.com/0x48piraj/PwnHouse
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/ARPSyndicate/cvemon
- https://github.com/AakaGoyal/OffensiveSecurity
- https://github.com/AidanBurkeCyb/Network-Vulnerability-Assessment-with-Nmap
- https://github.com/AndreevAleksandr/VandAttonInfoSys
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CYB3RLEO/Penenetration_Testing_Lab_Exploitation_Phase2-Metasploitable2
- https://github.com/CYB3RLEO/Penetration_Test_Report_Metasploitable2
- https://github.com/DmitriyPetrovskiy23/InfoSec-homework1
- https://github.com/FredBrave/CVE-2010-2075-UnrealIRCd-3.2.8.1
- https://github.com/Gdec02/nmap-scan-metasploitable
- https://github.com/Glumgam/UnrealiRCd-3.2.8.1-exploit-python
- https://github.com/ILoveOllyexe/Penetration-Test-Metasploitable2
- https://github.com/IvanEFibiger/LaboratorioHackingEtico
- https://github.com/JoseLRC97/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution
- https://github.com/MFernstrom/OffensivePascal-CVE-2010-2075
- https://github.com/MohamedSayed47/DEPI_Final_project
- https://github.com/Mr-Tree-S/POC_EXP
- https://github.com/Okarn/TP_securite_EDOU_JACQUEMONT
- https://github.com/Patrick122333/4240project
- https://github.com/PyTHoNsnake2004/Network-Scanning-with-Nmap
- https://github.com/RedTeamShanks/Local-Network-Vulnerability-Assessment
- https://github.com/Sania313/CyberSecurity
- https://github.com/SanjuCyb3r/Metasploitable-2
- https://github.com/Sh4dowX404/UnrealIRCD-3.2.8.1-Backdoor
- https://github.com/Takarigua/sys-pattern-homework13-01
- https://github.com/ViktorParkhomenko/Vulnerability-Scanning-and-Network-Security-Assessment
- https://github.com/VoitenkoAN/13.1
- https://github.com/XorgX304/UnrealIRCd-3.2.8.1-RCE
- https://github.com/abhinavcybersec/PenTest-Lab
- https://github.com/abhinavsinghx/PenTest-Lab
- https://github.com/adamssamson/Penetration-Testing-of-UnrealIRCd-3.2.8.1-on-Metasploitable-2
- https://github.com/baoloc10/SoftwareSec-Metasploitable2
- https://github.com/basimnawaz6/Metasploitable2
- https://github.com/chancej715/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution
- https://github.com/chancej715/chancej715
- https://github.com/cilliapwndev/Reaper
- https://github.com/delsawright/System-Scan-Report_PenTesting_RedTeaming
- https://github.com/djbender7/cybersecurity-labs
- https://github.com/jebidiah-anthony/htb_irked
- https://github.com/kevinpdicks/UnrealIRCD-3.2.8.1-RCE
- https://github.com/macosta-42/Exploit-Development
- https://github.com/marcocastro100/Intrusion_Detection_System-Python
- https://github.com/nguyentony-cyber/Penetration-Testing-Lab
- https://github.com/ninahonyango/VAPT
- https://github.com/noahmtubbs/Cybersecurity-HomeLab
- https://github.com/nwclasantha/Metasploit-RPC-and-PoC
- https://github.com/nwclasantha/unreal_ircd_3281_backdoor_and_mitigation
- https://github.com/owenkerrisk/Penetration-Testing-using-Kali-Metasploit-
- https://github.com/pedr0alencar/vlab-metasploitable2
- https://github.com/samjithjithu/Task-1-Nmap-Network-Scan
- https://github.com/vmmaltsev/13.1
- https://github.com/vonoid/attacks-on-IS