PoC-in-GitHub/2018/CVE-2018-8174.json

163 lines
6.1 KiB
JSON
Raw Normal View History

2019-12-08 14:19:20 +01:00
[
2020-03-28 10:07:52 +01:00
{
"id": 134479769,
"name": "CVE-2018-8174-msf",
"full_name": "0x09AL\/CVE-2018-8174-msf",
"owner": {
"login": "0x09AL",
"id": 25826294,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/25826294?v=4",
"html_url": "https:\/\/github.com\/0x09AL"
},
"html_url": "https:\/\/github.com\/0x09AL\/CVE-2018-8174-msf",
"description": "CVE-2018-8174 - VBScript memory corruption exploit.",
"fork": false,
"created_at": "2018-05-22T21:50:32Z",
"updated_at": "2020-02-21T17:21:50Z",
"pushed_at": "2018-05-23T20:43:58Z",
"stargazers_count": 160,
"watchers_count": 160,
"forks_count": 74,
"forks": 74,
"watchers": 160,
"score": 0
},
{
"id": 135381512,
"name": "CVE-2018-8174_EXP",
"full_name": "Yt1g3r\/CVE-2018-8174_EXP",
"owner": {
"login": "Yt1g3r",
"id": 12625147,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/12625147?v=4",
"html_url": "https:\/\/github.com\/Yt1g3r"
},
"html_url": "https:\/\/github.com\/Yt1g3r\/CVE-2018-8174_EXP",
"description": "CVE-2018-8174_python",
"fork": false,
"created_at": "2018-05-30T03:12:32Z",
"updated_at": "2020-03-09T12:03:04Z",
"pushed_at": "2018-05-30T03:33:14Z",
"stargazers_count": 124,
"watchers_count": 124,
"forks_count": 53,
"forks": 53,
"watchers": 124,
"score": 0
},
{
"id": 135767741,
"name": "CVE-2018-8174",
"full_name": "SyFi\/CVE-2018-8174",
"owner": {
"login": "SyFi",
"id": 26314806,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/26314806?v=4",
"html_url": "https:\/\/github.com\/SyFi"
},
"html_url": "https:\/\/github.com\/SyFi\/CVE-2018-8174",
"description": "MS Word MS WordPad via IE VBS Engine RCE ",
"fork": false,
"created_at": "2018-06-01T22:12:54Z",
"updated_at": "2019-12-06T00:54:27Z",
"pushed_at": "2018-06-01T22:18:59Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 11,
"forks": 11,
"watchers": 8,
"score": 0
},
{
"id": 138712476,
"name": "Rig-Exploit-for-CVE-2018-8174",
"full_name": "orf53975\/Rig-Exploit-for-CVE-2018-8174",
"owner": {
"login": "orf53975",
"id": 25189997,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/25189997?v=4",
"html_url": "https:\/\/github.com\/orf53975"
},
"html_url": "https:\/\/github.com\/orf53975\/Rig-Exploit-for-CVE-2018-8174",
"description": "Rig Exploit for CVE-2018-8174 As with its previous campaigns, Rigs Seamless campaign uses malvertising. In this case, the malvertisements have a hidden iframe that redirects victims to Rigs landing page, which includes an exploit for CVE-2018-8174 and shellcode. This enables remote code execution of the shellcode obfuscated in the landing page. After successful exploitation, a second-stage downloader is retrieved, which appears to be a variant of SmokeLoader due to the URL. It would then download the final payload, a Monero miner.",
"fork": false,
"created_at": "2018-06-26T09:03:45Z",
"updated_at": "2018-11-16T12:24:05Z",
"pushed_at": "2018-06-08T14:33:04Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 140478620,
"name": "cve-2018-8174_analysis",
"full_name": "piotrflorczyk\/cve-2018-8174_analysis",
"owner": {
"login": "piotrflorczyk",
"id": 7830144,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/7830144?v=4",
"html_url": "https:\/\/github.com\/piotrflorczyk"
},
"html_url": "https:\/\/github.com\/piotrflorczyk\/cve-2018-8174_analysis",
"description": "Analysis of VBS exploit CVE-2018-8174",
"fork": false,
"created_at": "2018-07-10T19:31:25Z",
2020-04-01 17:08:01 +02:00
"updated_at": "2020-04-01T13:35:00Z",
2020-03-28 10:07:52 +01:00
"pushed_at": "2018-07-12T08:35:13Z",
2020-04-01 17:08:01 +02:00
"stargazers_count": 11,
"watchers_count": 11,
2020-03-28 10:07:52 +01:00
"forks_count": 8,
"forks": 8,
2020-04-01 17:08:01 +02:00
"watchers": 11,
2020-03-28 10:07:52 +01:00
"score": 0
},
2019-12-08 14:19:20 +01:00
{
"id": 147615569,
"name": "CVE-2018-8174-msf",
"full_name": "denmilu\/CVE-2018-8174-msf",
"owner": {
"login": "denmilu",
"id": 2469038,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4",
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/denmilu"
2019-12-08 14:19:20 +01:00
},
"html_url": "https:\/\/github.com\/denmilu\/CVE-2018-8174-msf",
"description": null,
"fork": false,
"created_at": "2018-09-06T04:03:25Z",
"updated_at": "2018-09-06T04:03:37Z",
"pushed_at": "2018-09-06T04:03:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
2019-12-12 06:14:27 +01:00
"score": 0
},
{
"id": 188212551,
"name": "ie11_vbscript_exploit",
"full_name": "ruthlezs\/ie11_vbscript_exploit",
"owner": {
"login": "ruthlezs",
"id": 15887791,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/15887791?v=4",
"html_url": "https:\/\/github.com\/ruthlezs"
},
"html_url": "https:\/\/github.com\/ruthlezs\/ie11_vbscript_exploit",
"description": "Exploit Generator for CVE-2018-8174 & CVE-2019-0768 (RCE via VBScript Execution in IE11)",
"fork": false,
"created_at": "2019-05-23T10:28:40Z",
2020-03-04 04:07:38 +01:00
"updated_at": "2020-03-04T02:14:02Z",
2019-12-12 06:14:27 +01:00
"pushed_at": "2019-05-23T11:26:38Z",
2020-03-04 04:07:38 +01:00
"stargazers_count": 7,
"watchers_count": 7,
2020-03-11 04:07:38 +01:00
"forks_count": 4,
"forks": 4,
2020-03-04 04:07:38 +01:00
"watchers": 7,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
}
]