[ { "id": 134479769, "name": "CVE-2018-8174-msf", "full_name": "0x09AL\/CVE-2018-8174-msf", "owner": { "login": "0x09AL", "id": 25826294, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25826294?v=4", "html_url": "https:\/\/github.com\/0x09AL", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0x09AL\/CVE-2018-8174-msf", "description": "CVE-2018-8174 - VBScript memory corruption exploit.", "fork": false, "created_at": "2018-05-22T21:50:32Z", "updated_at": "2024-09-13T15:40:47Z", "pushed_at": "2018-05-23T20:43:58Z", "stargazers_count": 167, "watchers_count": 167, "has_discussions": false, "forks_count": 69, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 69, "watchers": 167, "score": 0, "subscribers_count": 14 }, { "id": 135381512, "name": "CVE-2018-8174_EXP", "full_name": "Yt1g3r\/CVE-2018-8174_EXP", "owner": { "login": "Yt1g3r", "id": 12625147, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12625147?v=4", "html_url": "https:\/\/github.com\/Yt1g3r", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Yt1g3r\/CVE-2018-8174_EXP", "description": "CVE-2018-8174_python", "fork": false, "created_at": "2018-05-30T03:12:32Z", "updated_at": "2025-01-07T10:07:40Z", "pushed_at": "2022-04-19T13:24:53Z", "stargazers_count": 140, "watchers_count": 140, "has_discussions": false, "forks_count": 70, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 70, "watchers": 140, "score": 0, "subscribers_count": 2 }, { "id": 135767741, "name": "CVE-2018-8174", "full_name": "SyFi\/CVE-2018-8174", "owner": { "login": "SyFi", "id": 26314806, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26314806?v=4", "html_url": "https:\/\/github.com\/SyFi", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/SyFi\/CVE-2018-8174", "description": "MS Word MS WordPad via IE VBS Engine RCE ", "fork": false, "created_at": "2018-06-01T22:12:54Z", "updated_at": "2024-08-29T01:22:24Z", "pushed_at": "2018-06-01T22:18:59Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, "forks_count": 16, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 16, "watchers": 7, "score": 0, "subscribers_count": 4 }, { "id": 138712476, "name": "Rig-Exploit-for-CVE-2018-8174", "full_name": "orf53975\/Rig-Exploit-for-CVE-2018-8174", "owner": { "login": "orf53975", "id": 25189997, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25189997?v=4", "html_url": "https:\/\/github.com\/orf53975", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/orf53975\/Rig-Exploit-for-CVE-2018-8174", "description": "Rig Exploit for CVE-2018-8174 As with its previous campaigns, Rig’s Seamless campaign uses malvertising. In this case, the malvertisements have a hidden iframe that redirects victims to Rig’s landing page, which includes an exploit for CVE-2018-8174 and shellcode. This enables remote code execution of the shellcode obfuscated in the landing page. After successful exploitation, a second-stage downloader is retrieved, which appears to be a variant of SmokeLoader due to the URL. It would then download the final payload, a Monero miner.", "fork": false, "created_at": "2018-06-26T09:03:45Z", "updated_at": "2023-11-25T06:09:26Z", "pushed_at": "2018-06-08T14:33:04Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 140478620, "name": "cve-2018-8174_analysis", "full_name": "piotrflorczyk\/cve-2018-8174_analysis", "owner": { "login": "piotrflorczyk", "id": 7830144, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7830144?v=4", "html_url": "https:\/\/github.com\/piotrflorczyk", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/piotrflorczyk\/cve-2018-8174_analysis", "description": "Analysis of VBS exploit CVE-2018-8174", "fork": false, "created_at": "2018-07-10T19:31:25Z", "updated_at": "2024-08-29T01:22:24Z", "pushed_at": "2018-07-12T08:35:13Z", "stargazers_count": 30, "watchers_count": 30, "has_discussions": false, "forks_count": 15, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 15, "watchers": 30, "score": 0, "subscribers_count": 4 }, { "id": 147615569, "name": "CVE-2018-8174-msf", "full_name": "likekabin\/CVE-2018-8174-msf", "owner": { "login": "likekabin", "id": 2469038, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4", "html_url": "https:\/\/github.com\/likekabin", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/likekabin\/CVE-2018-8174-msf", "description": null, "fork": false, "created_at": "2018-09-06T04:03:25Z", "updated_at": "2018-09-06T04:03:37Z", "pushed_at": "2018-09-06T04:03:36Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 370609005, "name": "CVE-2018-8174_EXP", "full_name": "DarkFlameMaster-bit\/CVE-2018-8174_EXP", "owner": { "login": "DarkFlameMaster-bit", "id": 84758348, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84758348?v=4", "html_url": "https:\/\/github.com\/DarkFlameMaster-bit", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/DarkFlameMaster-bit\/CVE-2018-8174_EXP", "description": null, "fork": false, "created_at": "2021-05-25T07:48:30Z", "updated_at": "2021-05-25T07:48:30Z", "pushed_at": "2021-05-25T07:48:31Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 431720524, "name": "CVE-2018-8174-exp", "full_name": "lisinan988\/CVE-2018-8174-exp", "owner": { "login": "lisinan988", "id": 87479262, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87479262?v=4", "html_url": "https:\/\/github.com\/lisinan988", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/lisinan988\/CVE-2018-8174-exp", "description": null, "fork": false, "created_at": "2021-11-25T05:06:25Z", "updated_at": "2021-11-25T05:15:38Z", "pushed_at": "2022-04-21T13:50:02Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 434589002, "name": "https-github.com-iBearcat-CVE-2018-8174_EXP", "full_name": "sinisterghost\/https-github.com-iBearcat-CVE-2018-8174_EXP", "owner": { "login": "sinisterghost", "id": 92614950, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92614950?v=4", "html_url": "https:\/\/github.com\/sinisterghost", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sinisterghost\/https-github.com-iBearcat-CVE-2018-8174_EXP", "description": null, "fork": false, "created_at": "2021-12-03T12:30:07Z", "updated_at": "2021-12-03T12:30:07Z", "pushed_at": "2021-12-03T12:30:08Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 } ]