[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":17,"vulnerability-18768":24},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},["Island",18],{"key":19,"params":20,"result":22},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":21},"{\"text-color\":\"gray\"}",{"head":23},{},{"id":25,"detectable_with":26,"vuln_details":33,"vuln_id":47,"name":48,"published":49,"updated":34},18768,{"tool":27,"engine":30},{"id":28,"name":29},1,"Network Scanner",{"id":31,"name":32},3,"OpenVAS",{"id":25,"codename":34,"description":34,"severity":34,"risk_description":35,"public_description":36,"public_recommendation":37,"recommendation":34,"references":38,"cvssv3":34,"epss_score":42,"epss_percentile":43,"cve":44,"in_cisa_catalog":46,"date":34,"software_type":34,"vendor":34,"product":34,"ptt_exploit_capabilities":34},null,"Remote attackers can exploit this issue to execute arbitrary system commands within the context of the affected application.","Detection of backdoor in UnrealIRCd.","Install latest version of unrealircd and check signatures of software youre installing.",[39,40,41],"http://www.unrealircd.com/txt/unrealsecadvisory.20100612.txt","http://seclists.org/fulldisclosure/2010/Jun/277","http://www.securityfocus.com/bid/40820",0.86223,0.99399,[45],"CVE-2010-2075",false,"NETSCAN-OPENVAS-1.3.6.1.4.1.25623.1.0.80111","UnrealIRCd Backdoor","2018-01-02T00:00:00Z"]