PoC-in-GitHub/2018/CVE-2018-8174.json

163 lines
6.1 KiB
JSON
Raw Normal View History

2019-12-08 22:19:20 +09:00
[
{
"id": 134479769,
"name": "CVE-2018-8174-msf",
"full_name": "0x09AL\/CVE-2018-8174-msf",
"owner": {
"login": "0x09AL",
"id": 25826294,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/25826294?v=4",
2019-12-12 14:14:27 +09:00
"html_url": "https:\/\/github.com\/0x09AL"
2019-12-08 22:19:20 +09:00
},
"html_url": "https:\/\/github.com\/0x09AL\/CVE-2018-8174-msf",
"description": "CVE-2018-8174 - VBScript memory corruption exploit.",
"fork": false,
"created_at": "2018-05-22T21:50:32Z",
"updated_at": "2019-11-20T10:32:39Z",
"pushed_at": "2018-05-23T20:43:58Z",
"stargazers_count": 154,
"watchers_count": 154,
"forks_count": 71,
"forks": 71,
"watchers": 154,
2019-12-10 00:05:38 +09:00
"score": 0
2019-12-08 22:19:20 +09:00
},
{
"id": 135381512,
"name": "CVE-2018-8174_EXP",
"full_name": "Yt1g3r\/CVE-2018-8174_EXP",
"owner": {
"login": "Yt1g3r",
"id": 12625147,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/12625147?v=4",
2019-12-12 14:14:27 +09:00
"html_url": "https:\/\/github.com\/Yt1g3r"
2019-12-08 22:19:20 +09:00
},
"html_url": "https:\/\/github.com\/Yt1g3r\/CVE-2018-8174_EXP",
"description": "CVE-2018-8174_python",
"fork": false,
"created_at": "2018-05-30T03:12:32Z",
"updated_at": "2019-11-28T03:37:15Z",
"pushed_at": "2018-05-30T03:33:14Z",
"stargazers_count": 118,
"watchers_count": 118,
"forks_count": 47,
"forks": 47,
"watchers": 118,
2019-12-10 00:05:38 +09:00
"score": 0
2019-12-08 22:19:20 +09:00
},
{
"id": 135767741,
"name": "CVE-2018-8174",
"full_name": "SyFi\/CVE-2018-8174",
"owner": {
"login": "SyFi",
"id": 26314806,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/26314806?v=4",
2019-12-12 14:14:27 +09:00
"html_url": "https:\/\/github.com\/SyFi"
2019-12-08 22:19:20 +09:00
},
"html_url": "https:\/\/github.com\/SyFi\/CVE-2018-8174",
"description": "MS Word MS WordPad via IE VBS Engine RCE ",
"fork": false,
"created_at": "2018-06-01T22:12:54Z",
"updated_at": "2019-12-06T00:54:27Z",
"pushed_at": "2018-06-01T22:18:59Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 11,
"forks": 11,
"watchers": 8,
2019-12-10 00:05:38 +09:00
"score": 0
2019-12-08 22:19:20 +09:00
},
{
"id": 138712476,
"name": "Rig-Exploit-for-CVE-2018-8174",
"full_name": "orf53975\/Rig-Exploit-for-CVE-2018-8174",
"owner": {
"login": "orf53975",
"id": 25189997,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/25189997?v=4",
2019-12-12 14:14:27 +09:00
"html_url": "https:\/\/github.com\/orf53975"
2019-12-08 22:19:20 +09:00
},
"html_url": "https:\/\/github.com\/orf53975\/Rig-Exploit-for-CVE-2018-8174",
"description": "Rig Exploit for CVE-2018-8174 As with its previous campaigns, Rigs Seamless campaign uses malvertising. In this case, the malvertisements have a hidden iframe that redirects victims to Rigs landing page, which includes an exploit for CVE-2018-8174 and shellcode. This enables remote code execution of the shellcode obfuscated in the landing page. After successful exploitation, a second-stage downloader is retrieved, which appears to be a variant of SmokeLoader due to the URL. It would then download the final payload, a Monero miner.",
"fork": false,
"created_at": "2018-06-26T09:03:45Z",
"updated_at": "2018-11-16T12:24:05Z",
"pushed_at": "2018-06-08T14:33:04Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
2019-12-12 14:14:27 +09:00
"score": 0
},
{
"id": 140478620,
"name": "cve-2018-8174_analysis",
"full_name": "piotrflorczyk\/cve-2018-8174_analysis",
"owner": {
"login": "piotrflorczyk",
"id": 7830144,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/7830144?v=4",
"html_url": "https:\/\/github.com\/piotrflorczyk"
},
"html_url": "https:\/\/github.com\/piotrflorczyk\/cve-2018-8174_analysis",
"description": "Analysis of VBS exploit CVE-2018-8174",
"fork": false,
"created_at": "2018-07-10T19:31:25Z",
"updated_at": "2019-07-10T21:05:38Z",
"pushed_at": "2018-07-12T08:35:13Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 5,
"forks": 5,
"watchers": 10,
2019-12-10 00:05:38 +09:00
"score": 0
2019-12-08 22:19:20 +09:00
},
{
"id": 147615569,
"name": "CVE-2018-8174-msf",
"full_name": "denmilu\/CVE-2018-8174-msf",
"owner": {
"login": "denmilu",
"id": 2469038,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4",
2019-12-12 14:14:27 +09:00
"html_url": "https:\/\/github.com\/denmilu"
2019-12-08 22:19:20 +09:00
},
"html_url": "https:\/\/github.com\/denmilu\/CVE-2018-8174-msf",
"description": null,
"fork": false,
"created_at": "2018-09-06T04:03:25Z",
"updated_at": "2018-09-06T04:03:37Z",
"pushed_at": "2018-09-06T04:03:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
2019-12-12 14:14:27 +09:00
"score": 0
},
{
"id": 188212551,
"name": "ie11_vbscript_exploit",
"full_name": "ruthlezs\/ie11_vbscript_exploit",
"owner": {
"login": "ruthlezs",
"id": 15887791,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/15887791?v=4",
"html_url": "https:\/\/github.com\/ruthlezs"
},
"html_url": "https:\/\/github.com\/ruthlezs\/ie11_vbscript_exploit",
"description": "Exploit Generator for CVE-2018-8174 & CVE-2019-0768 (RCE via VBScript Execution in IE11)",
"fork": false,
"created_at": "2019-05-23T10:28:40Z",
"updated_at": "2019-11-09T17:32:18Z",
"pushed_at": "2019-05-23T11:26:38Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 3,
"forks": 3,
"watchers": 5,
2019-12-10 00:05:38 +09:00
"score": 0
2019-12-08 22:19:20 +09:00
}
]