Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | cve-2010-2075 | https://github.com/XorgX304/UnrealIRCd-3.2.8.1-RCE | POC Details |
| 2 | FreePascal implementation of the UnrealIRCD CVE-2010-2075 | https://github.com/MFernstrom/OffensivePascal-CVE-2010-2075 | POC Details |
| 3 | UnrealIRCd 3.2.8.1 backdoor command execution exploit in Python 3 (CVE-2010-2075). | https://github.com/chancej715/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution | POC Details |
| 4 | Exploit for CVE:2010-2075. This exploit allows remote command execution in UnrealIRCd 3.2.8.1. | https://github.com/FredBrave/CVE-2010-2075-UnrealIRCd-3.2.8.1 | POC Details |
| 5 | Script that exploits the vulnerability that allows establishing a backdoor in the UnrealIRCd service with CVE-2010-2075 | https://github.com/JoseLRC97/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution | POC Details |
| 6 | The UnrealIRCd 3.2.8.1 Backdoor is associated with CVE-2010-2075, a well-known vulnerability that was introduced when the source code of the UnrealIRCd software was compromised. | https://github.com/nwclasantha/unreal_ircd_3281_backdoor_and_mitigation | POC Details |
| 7 | I recently set up a small Penetration Testing Lab to get some hands-on experience with vulnerability scanning and exploitation. Using Nessus and Kali Linux, I was able to dive into Metasploitable 2, a deliberately vulnerable system, and identify a pretty serious flaw (CVE-2010-2075). | https://github.com/abhinavcybersec/PenTest-Lab | POC Details |
| 8 | I recently set up a small Penetration Testing Lab to get some hands-on experience with vulnerability scanning and exploitation. Using Nessus and Kali Linux, I was able to dive into Metasploitable 2, a deliberately vulnerable system, and identify a pretty serious flaw (CVE-2010-2075). | https://github.com/abhinavsinghx/PenTest-Lab | POC Details |
| 9 | CVE-2010-2075 | https://github.com/earthbendergara/unrealircd3.2.8.1-local-exploit | POC Details |
No public POC found.
Login to generate AI POC| CVE-2010-2182 | Adobe Flash Player和Adobe AIR未明内存占用漏洞 | |
| CVE-2010-2302 | Google Chrome WebKit WebCore释放后使用漏洞 | |
| CVE-2010-2301 | Google Chrome WebKit 'editing/markup.cpp'多个跨站脚本攻击漏洞 | |
| CVE-2010-2296 | Google Chrome未明DOM方法实现方式权限许可和访问控制问题漏洞 | |
| CVE-2010-2299 | Google Chrome Clipboard::DispatchObject函数代码注入漏洞 | |
| CVE-2010-2298 | Google Chrome 'rowser/renderer_host/database_dispatcher_host.cc'输入验证错误漏洞 | |
| CVE-2010-2297 | Google Chrome WebKit 'rendering/FixedTableLayout.cpp'代码注入漏洞 | |
| CVE-2010-2300 | Google Chrome WebKit Element::normalizeAttributes函数释放后使用漏洞 | |
| CVE-2010-2184 | Adobe Flash Player和Adobe AIR未明内存占用漏洞 | |
| CVE-2010-2183 | Adobe Flash Player和Adobe AIR整数溢出漏洞 | |
| CVE-2010-2185 | Adobe Flash Player和Adobe AIR缓冲区溢出漏洞 | |
| CVE-2010-2181 | Adobe Flash Player和Adobe AIR整数溢出漏洞 | |
| CVE-2010-2180 | Adobe Flash Player 和 AIR未明内存占用漏洞 | |
| CVE-2010-2179 | Adobe Flash Player和Adobe AIR URI解析跨站脚本攻击漏洞 | |
| CVE-2010-2178 | Adobe Flash Player和Adobe AIR未明内存占用漏洞 | |
| CVE-2010-2177 | Adobe Flash Player和Adobe AIR未明内存占用漏洞 | |
| CVE-2010-2176 | Adobe Flash Player和Adobe AIR未明内存占用漏洞 | |
| CVE-2010-2175 | Adobe Flash Player 和 AIR未明内存占用漏洞 | |
| CVE-2010-2174 | Adobe Flash Player和AIR缓冲区溢出漏洞 | |
| CVE-2010-2173 | Adobe Flash Player和AIR无效指针远程代码执行漏洞 |
Showing top 20 of 53 CVEs. View all on vendor page → →
No comments yet