2019-12-08 14:19:20 +01:00
[
2020-03-28 10:07:52 +01:00
{
"id" : 134479769 ,
"name" : "CVE-2018-8174-msf" ,
"full_name" : "0x09AL\/CVE-2018-8174-msf" ,
"owner" : {
"login" : "0x09AL" ,
"id" : 25826294 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/25826294?v=4" ,
"html_url" : "https:\/\/github.com\/0x09AL"
} ,
"html_url" : "https:\/\/github.com\/0x09AL\/CVE-2018-8174-msf" ,
"description" : "CVE-2018-8174 - VBScript memory corruption exploit." ,
"fork" : false ,
"created_at" : "2018-05-22T21:50:32Z" ,
"updated_at" : "2020-02-21T17:21:50Z" ,
"pushed_at" : "2018-05-23T20:43:58Z" ,
"stargazers_count" : 160 ,
"watchers_count" : 160 ,
"forks_count" : 74 ,
"forks" : 74 ,
"watchers" : 160 ,
"score" : 0
} ,
{
"id" : 135381512 ,
"name" : "CVE-2018-8174_EXP" ,
"full_name" : "Yt1g3r\/CVE-2018-8174_EXP" ,
"owner" : {
"login" : "Yt1g3r" ,
"id" : 12625147 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/12625147?v=4" ,
"html_url" : "https:\/\/github.com\/Yt1g3r"
} ,
"html_url" : "https:\/\/github.com\/Yt1g3r\/CVE-2018-8174_EXP" ,
"description" : "CVE-2018-8174_python" ,
"fork" : false ,
"created_at" : "2018-05-30T03:12:32Z" ,
"updated_at" : "2020-03-09T12:03:04Z" ,
"pushed_at" : "2018-05-30T03:33:14Z" ,
"stargazers_count" : 124 ,
"watchers_count" : 124 ,
"forks_count" : 53 ,
"forks" : 53 ,
"watchers" : 124 ,
"score" : 0
} ,
{
"id" : 135767741 ,
"name" : "CVE-2018-8174" ,
"full_name" : "SyFi\/CVE-2018-8174" ,
"owner" : {
"login" : "SyFi" ,
"id" : 26314806 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/26314806?v=4" ,
"html_url" : "https:\/\/github.com\/SyFi"
} ,
"html_url" : "https:\/\/github.com\/SyFi\/CVE-2018-8174" ,
"description" : "MS Word MS WordPad via IE VBS Engine RCE " ,
"fork" : false ,
"created_at" : "2018-06-01T22:12:54Z" ,
"updated_at" : "2019-12-06T00:54:27Z" ,
"pushed_at" : "2018-06-01T22:18:59Z" ,
"stargazers_count" : 8 ,
"watchers_count" : 8 ,
"forks_count" : 11 ,
"forks" : 11 ,
"watchers" : 8 ,
"score" : 0
} ,
{
"id" : 138712476 ,
"name" : "Rig-Exploit-for-CVE-2018-8174" ,
"full_name" : "orf53975\/Rig-Exploit-for-CVE-2018-8174" ,
"owner" : {
"login" : "orf53975" ,
"id" : 25189997 ,
"avatar_url" : "https:\/\/avatars3.githubusercontent.com\/u\/25189997?v=4" ,
"html_url" : "https:\/\/github.com\/orf53975"
} ,
"html_url" : "https:\/\/github.com\/orf53975\/Rig-Exploit-for-CVE-2018-8174" ,
"description" : "Rig Exploit for CVE-2018-8174 As with its previous campaigns, Rig’ s Seamless campaign uses malvertising. In this case, the malvertisements have a hidden iframe that redirects victims to Rig’ s landing page, which includes an exploit for CVE-2018-8174 and shellcode. This enables remote code execution of the shellcode obfuscated in the landing page. After successful exploitation, a second-stage downloader is retrieved, which appears to be a variant of SmokeLoader due to the URL. It would then download the final payload, a Monero miner." ,
"fork" : false ,
"created_at" : "2018-06-26T09:03:45Z" ,
"updated_at" : "2018-11-16T12:24:05Z" ,
"pushed_at" : "2018-06-08T14:33:04Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 1 ,
"forks" : 1 ,
"watchers" : 1 ,
"score" : 0
} ,
{
"id" : 140478620 ,
"name" : "cve-2018-8174_analysis" ,
"full_name" : "piotrflorczyk\/cve-2018-8174_analysis" ,
"owner" : {
"login" : "piotrflorczyk" ,
"id" : 7830144 ,
"avatar_url" : "https:\/\/avatars3.githubusercontent.com\/u\/7830144?v=4" ,
"html_url" : "https:\/\/github.com\/piotrflorczyk"
} ,
"html_url" : "https:\/\/github.com\/piotrflorczyk\/cve-2018-8174_analysis" ,
"description" : "Analysis of VBS exploit CVE-2018-8174" ,
"fork" : false ,
"created_at" : "2018-07-10T19:31:25Z" ,
2020-04-01 17:08:01 +02:00
"updated_at" : "2020-04-01T13:35:00Z" ,
2020-03-28 10:07:52 +01:00
"pushed_at" : "2018-07-12T08:35:13Z" ,
2020-04-01 17:08:01 +02:00
"stargazers_count" : 11 ,
"watchers_count" : 11 ,
2020-03-28 10:07:52 +01:00
"forks_count" : 8 ,
"forks" : 8 ,
2020-04-01 17:08:01 +02:00
"watchers" : 11 ,
2020-03-28 10:07:52 +01:00
"score" : 0
} ,
2019-12-08 14:19:20 +01:00
{
"id" : 147615569 ,
"name" : "CVE-2018-8174-msf" ,
"full_name" : "denmilu\/CVE-2018-8174-msf" ,
"owner" : {
"login" : "denmilu" ,
"id" : 2469038 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4" ,
2019-12-12 06:14:27 +01:00
"html_url" : "https:\/\/github.com\/denmilu"
2019-12-08 14:19:20 +01:00
} ,
"html_url" : "https:\/\/github.com\/denmilu\/CVE-2018-8174-msf" ,
"description" : null ,
"fork" : false ,
"created_at" : "2018-09-06T04:03:25Z" ,
"updated_at" : "2018-09-06T04:03:37Z" ,
"pushed_at" : "2018-09-06T04:03:36Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
2019-12-12 06:14:27 +01:00
"score" : 0
} ,
{
"id" : 188212551 ,
"name" : "ie11_vbscript_exploit" ,
"full_name" : "ruthlezs\/ie11_vbscript_exploit" ,
"owner" : {
"login" : "ruthlezs" ,
"id" : 15887791 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/15887791?v=4" ,
"html_url" : "https:\/\/github.com\/ruthlezs"
} ,
"html_url" : "https:\/\/github.com\/ruthlezs\/ie11_vbscript_exploit" ,
"description" : "Exploit Generator for CVE-2018-8174 & CVE-2019-0768 (RCE via VBScript Execution in IE11)" ,
"fork" : false ,
"created_at" : "2019-05-23T10:28:40Z" ,
2020-03-04 04:07:38 +01:00
"updated_at" : "2020-03-04T02:14:02Z" ,
2019-12-12 06:14:27 +01:00
"pushed_at" : "2019-05-23T11:26:38Z" ,
2020-03-04 04:07:38 +01:00
"stargazers_count" : 7 ,
"watchers_count" : 7 ,
2020-03-11 04:07:38 +01:00
"forks_count" : 4 ,
"forks" : 4 ,
2020-03-04 04:07:38 +01:00
"watchers" : 7 ,
2019-12-09 16:05:38 +01:00
"score" : 0
2019-12-08 14:19:20 +01:00
}
]