PoC-in-GitHub/2018/CVE-2018-8174.json
2020-07-31 18:08:40 +09:00

186 lines
No EOL
6.9 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 134479769,
"name": "CVE-2018-8174-msf",
"full_name": "0x09AL\/CVE-2018-8174-msf",
"owner": {
"login": "0x09AL",
"id": 25826294,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/25826294?v=4",
"html_url": "https:\/\/github.com\/0x09AL"
},
"html_url": "https:\/\/github.com\/0x09AL\/CVE-2018-8174-msf",
"description": "CVE-2018-8174 - VBScript memory corruption exploit.",
"fork": false,
"created_at": "2018-05-22T21:50:32Z",
"updated_at": "2020-07-01T14:40:55Z",
"pushed_at": "2018-05-23T20:43:58Z",
"stargazers_count": 164,
"watchers_count": 164,
"forks_count": 77,
"forks": 77,
"watchers": 164,
"score": 0
},
{
"id": 135381512,
"name": "CVE-2018-8174_EXP",
"full_name": "Yt1g3r\/CVE-2018-8174_EXP",
"owner": {
"login": "Yt1g3r",
"id": 12625147,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/12625147?v=4",
"html_url": "https:\/\/github.com\/Yt1g3r"
},
"html_url": "https:\/\/github.com\/Yt1g3r\/CVE-2018-8174_EXP",
"description": "CVE-2018-8174_python",
"fork": false,
"created_at": "2018-05-30T03:12:32Z",
"updated_at": "2020-07-26T09:27:58Z",
"pushed_at": "2018-05-30T03:33:14Z",
"stargazers_count": 128,
"watchers_count": 128,
"forks_count": 55,
"forks": 55,
"watchers": 128,
"score": 0
},
{
"id": 135767741,
"name": "CVE-2018-8174",
"full_name": "SyFi\/CVE-2018-8174",
"owner": {
"login": "SyFi",
"id": 26314806,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/26314806?v=4",
"html_url": "https:\/\/github.com\/SyFi"
},
"html_url": "https:\/\/github.com\/SyFi\/CVE-2018-8174",
"description": "MS Word MS WordPad via IE VBS Engine RCE ",
"fork": false,
"created_at": "2018-06-01T22:12:54Z",
"updated_at": "2019-12-06T00:54:27Z",
"pushed_at": "2018-06-01T22:18:59Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 11,
"forks": 11,
"watchers": 8,
"score": 0
},
{
"id": 138712476,
"name": "Rig-Exploit-for-CVE-2018-8174",
"full_name": "orf53975\/Rig-Exploit-for-CVE-2018-8174",
"owner": {
"login": "orf53975",
"id": 25189997,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/25189997?v=4",
"html_url": "https:\/\/github.com\/orf53975"
},
"html_url": "https:\/\/github.com\/orf53975\/Rig-Exploit-for-CVE-2018-8174",
"description": "Rig Exploit for CVE-2018-8174 As with its previous campaigns, Rigs Seamless campaign uses malvertising. In this case, the malvertisements have a hidden iframe that redirects victims to Rigs landing page, which includes an exploit for CVE-2018-8174 and shellcode. This enables remote code execution of the shellcode obfuscated in the landing page. After successful exploitation, a second-stage downloader is retrieved, which appears to be a variant of SmokeLoader due to the URL. It would then download the final payload, a Monero miner.",
"fork": false,
"created_at": "2018-06-26T09:03:45Z",
"updated_at": "2018-11-16T12:24:05Z",
"pushed_at": "2018-06-08T14:33:04Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 140478620,
"name": "cve-2018-8174_analysis",
"full_name": "piotrflorczyk\/cve-2018-8174_analysis",
"owner": {
"login": "piotrflorczyk",
"id": 7830144,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/7830144?v=4",
"html_url": "https:\/\/github.com\/piotrflorczyk"
},
"html_url": "https:\/\/github.com\/piotrflorczyk\/cve-2018-8174_analysis",
"description": "Analysis of VBS exploit CVE-2018-8174",
"fork": false,
"created_at": "2018-07-10T19:31:25Z",
"updated_at": "2020-07-01T18:29:24Z",
"pushed_at": "2018-07-12T08:35:13Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 14,
"forks": 14,
"watchers": 14,
"score": 0
},
{
"id": 147615569,
"name": "CVE-2018-8174-msf",
"full_name": "denmilu\/CVE-2018-8174-msf",
"owner": {
"login": "denmilu",
"id": 2469038,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/denmilu"
},
"html_url": "https:\/\/github.com\/denmilu\/CVE-2018-8174-msf",
"description": null,
"fork": false,
"created_at": "2018-09-06T04:03:25Z",
"updated_at": "2018-09-06T04:03:37Z",
"pushed_at": "2018-09-06T04:03:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 188212551,
"name": "ie11_vbscript_exploit",
"full_name": "ruthlezs\/ie11_vbscript_exploit",
"owner": {
"login": "ruthlezs",
"id": 15887791,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/15887791?v=4",
"html_url": "https:\/\/github.com\/ruthlezs"
},
"html_url": "https:\/\/github.com\/ruthlezs\/ie11_vbscript_exploit",
"description": "Exploit Generator for CVE-2018-8174 & CVE-2019-0768 (RCE via VBScript Execution in IE11)",
"fork": false,
"created_at": "2019-05-23T10:28:40Z",
"updated_at": "2020-07-26T09:29:02Z",
"pushed_at": "2019-05-23T11:26:38Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 5,
"forks": 5,
"watchers": 9,
"score": 0
},
{
"id": 283930515,
"name": "CVE-2018-8174_EXP",
"full_name": "ericisnotrealname\/CVE-2018-8174_EXP",
"owner": {
"login": "ericisnotrealname",
"id": 69024235,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/69024235?v=4",
"html_url": "https:\/\/github.com\/ericisnotrealname"
},
"html_url": "https:\/\/github.com\/ericisnotrealname\/CVE-2018-8174_EXP",
"description": null,
"fork": false,
"created_at": "2020-07-31T03:13:43Z",
"updated_at": "2020-07-31T03:13:56Z",
"pushed_at": "2020-07-31T03:13:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]