mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
186 lines
No EOL
6.9 KiB
JSON
186 lines
No EOL
6.9 KiB
JSON
[
|
||
{
|
||
"id": 134479769,
|
||
"name": "CVE-2018-8174-msf",
|
||
"full_name": "0x09AL\/CVE-2018-8174-msf",
|
||
"owner": {
|
||
"login": "0x09AL",
|
||
"id": 25826294,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/25826294?v=4",
|
||
"html_url": "https:\/\/github.com\/0x09AL"
|
||
},
|
||
"html_url": "https:\/\/github.com\/0x09AL\/CVE-2018-8174-msf",
|
||
"description": "CVE-2018-8174 - VBScript memory corruption exploit.",
|
||
"fork": false,
|
||
"created_at": "2018-05-22T21:50:32Z",
|
||
"updated_at": "2020-08-16T14:02:23Z",
|
||
"pushed_at": "2018-05-23T20:43:58Z",
|
||
"stargazers_count": 163,
|
||
"watchers_count": 163,
|
||
"forks_count": 77,
|
||
"forks": 77,
|
||
"watchers": 163,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 135381512,
|
||
"name": "CVE-2018-8174_EXP",
|
||
"full_name": "Yt1g3r\/CVE-2018-8174_EXP",
|
||
"owner": {
|
||
"login": "Yt1g3r",
|
||
"id": 12625147,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/12625147?v=4",
|
||
"html_url": "https:\/\/github.com\/Yt1g3r"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Yt1g3r\/CVE-2018-8174_EXP",
|
||
"description": "CVE-2018-8174_python",
|
||
"fork": false,
|
||
"created_at": "2018-05-30T03:12:32Z",
|
||
"updated_at": "2020-08-03T06:53:16Z",
|
||
"pushed_at": "2018-05-30T03:33:14Z",
|
||
"stargazers_count": 128,
|
||
"watchers_count": 128,
|
||
"forks_count": 56,
|
||
"forks": 56,
|
||
"watchers": 128,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 135767741,
|
||
"name": "CVE-2018-8174",
|
||
"full_name": "SyFi\/CVE-2018-8174",
|
||
"owner": {
|
||
"login": "SyFi",
|
||
"id": 26314806,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/26314806?v=4",
|
||
"html_url": "https:\/\/github.com\/SyFi"
|
||
},
|
||
"html_url": "https:\/\/github.com\/SyFi\/CVE-2018-8174",
|
||
"description": "MS Word MS WordPad via IE VBS Engine RCE ",
|
||
"fork": false,
|
||
"created_at": "2018-06-01T22:12:54Z",
|
||
"updated_at": "2019-12-06T00:54:27Z",
|
||
"pushed_at": "2018-06-01T22:18:59Z",
|
||
"stargazers_count": 8,
|
||
"watchers_count": 8,
|
||
"forks_count": 11,
|
||
"forks": 11,
|
||
"watchers": 8,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 138712476,
|
||
"name": "Rig-Exploit-for-CVE-2018-8174",
|
||
"full_name": "orf53975\/Rig-Exploit-for-CVE-2018-8174",
|
||
"owner": {
|
||
"login": "orf53975",
|
||
"id": 25189997,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/25189997?v=4",
|
||
"html_url": "https:\/\/github.com\/orf53975"
|
||
},
|
||
"html_url": "https:\/\/github.com\/orf53975\/Rig-Exploit-for-CVE-2018-8174",
|
||
"description": "Rig Exploit for CVE-2018-8174 As with its previous campaigns, Rig’s Seamless campaign uses malvertising. In this case, the malvertisements have a hidden iframe that redirects victims to Rig’s landing page, which includes an exploit for CVE-2018-8174 and shellcode. This enables remote code execution of the shellcode obfuscated in the landing page. After successful exploitation, a second-stage downloader is retrieved, which appears to be a variant of SmokeLoader due to the URL. It would then download the final payload, a Monero miner.",
|
||
"fork": false,
|
||
"created_at": "2018-06-26T09:03:45Z",
|
||
"updated_at": "2018-11-16T12:24:05Z",
|
||
"pushed_at": "2018-06-08T14:33:04Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 140478620,
|
||
"name": "cve-2018-8174_analysis",
|
||
"full_name": "piotrflorczyk\/cve-2018-8174_analysis",
|
||
"owner": {
|
||
"login": "piotrflorczyk",
|
||
"id": 7830144,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/7830144?v=4",
|
||
"html_url": "https:\/\/github.com\/piotrflorczyk"
|
||
},
|
||
"html_url": "https:\/\/github.com\/piotrflorczyk\/cve-2018-8174_analysis",
|
||
"description": "Analysis of VBS exploit CVE-2018-8174",
|
||
"fork": false,
|
||
"created_at": "2018-07-10T19:31:25Z",
|
||
"updated_at": "2020-08-22T07:25:12Z",
|
||
"pushed_at": "2018-07-12T08:35:13Z",
|
||
"stargazers_count": 16,
|
||
"watchers_count": 16,
|
||
"forks_count": 14,
|
||
"forks": 14,
|
||
"watchers": 16,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 147615569,
|
||
"name": "CVE-2018-8174-msf",
|
||
"full_name": "likescam\/CVE-2018-8174-msf",
|
||
"owner": {
|
||
"login": "likescam",
|
||
"id": 2469038,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4",
|
||
"html_url": "https:\/\/github.com\/likescam"
|
||
},
|
||
"html_url": "https:\/\/github.com\/likescam\/CVE-2018-8174-msf",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2018-09-06T04:03:25Z",
|
||
"updated_at": "2018-09-06T04:03:37Z",
|
||
"pushed_at": "2018-09-06T04:03:36Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 188212551,
|
||
"name": "ie11_vbscript_exploit",
|
||
"full_name": "ruthlezs\/ie11_vbscript_exploit",
|
||
"owner": {
|
||
"login": "ruthlezs",
|
||
"id": 15887791,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/15887791?v=4",
|
||
"html_url": "https:\/\/github.com\/ruthlezs"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ruthlezs\/ie11_vbscript_exploit",
|
||
"description": "Exploit Generator for CVE-2018-8174 & CVE-2019-0768 (RCE via VBScript Execution in IE11)",
|
||
"fork": false,
|
||
"created_at": "2019-05-23T10:28:40Z",
|
||
"updated_at": "2020-08-22T07:25:15Z",
|
||
"pushed_at": "2019-05-23T11:26:38Z",
|
||
"stargazers_count": 10,
|
||
"watchers_count": 10,
|
||
"forks_count": 5,
|
||
"forks": 5,
|
||
"watchers": 10,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 283930515,
|
||
"name": "CVE-2018-8174_EXP",
|
||
"full_name": "ericisnotrealname\/CVE-2018-8174_EXP",
|
||
"owner": {
|
||
"login": "ericisnotrealname",
|
||
"id": 69024235,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/69024235?v=4",
|
||
"html_url": "https:\/\/github.com\/ericisnotrealname"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ericisnotrealname\/CVE-2018-8174_EXP",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2020-07-31T03:13:43Z",
|
||
"updated_at": "2020-07-31T03:13:56Z",
|
||
"pushed_at": "2020-07-31T03:13:53Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
}
|
||
] |