PoC-in-GitHub/2017/CVE-2017-11882.json
2025-03-07 03:12:43 +09:00

505 lines
No EOL
18 KiB
JSON

[
{
"id": 111305094,
"name": "cve-2017-11882",
"full_name": "zhouat\/cve-2017-11882",
"owner": {
"login": "zhouat",
"id": 8078184,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8078184?v=4",
"html_url": "https:\/\/github.com\/zhouat",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zhouat\/cve-2017-11882",
"description": null,
"fork": false,
"created_at": "2017-11-19T14:57:41Z",
"updated_at": "2017-11-21T09:11:26Z",
"pushed_at": "2017-11-18T14:21:03Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 111435936,
"name": "CVE-2017-11882",
"full_name": "embedi\/CVE-2017-11882",
"owner": {
"login": "embedi",
"id": 24190344,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24190344?v=4",
"html_url": "https:\/\/github.com\/embedi",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/embedi\/CVE-2017-11882",
"description": "Proof-of-Concept exploits for CVE-2017-11882",
"fork": false,
"created_at": "2017-11-20T16:35:30Z",
"updated_at": "2025-01-07T11:29:38Z",
"pushed_at": "2017-11-29T16:13:23Z",
"stargazers_count": 493,
"watchers_count": 493,
"has_discussions": false,
"forks_count": 181,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 181,
"watchers": 493,
"score": 0,
"subscribers_count": 39
},
{
"id": 111505810,
"name": "CVE-2017-11882",
"full_name": "Ridter\/CVE-2017-11882",
"owner": {
"login": "Ridter",
"id": 6007471,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6007471?v=4",
"html_url": "https:\/\/github.com\/Ridter",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Ridter\/CVE-2017-11882",
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
"fork": false,
"created_at": "2017-11-21T05:55:53Z",
"updated_at": "2025-02-15T17:00:29Z",
"pushed_at": "2017-11-29T03:33:53Z",
"stargazers_count": 541,
"watchers_count": 541,
"has_discussions": false,
"forks_count": 252,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 252,
"watchers": 541,
"score": 0,
"subscribers_count": 28
},
{
"id": 111525857,
"name": "2017-11882_Generator",
"full_name": "BlackMathIT\/2017-11882_Generator",
"owner": {
"login": "BlackMathIT",
"id": 26303870,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26303870?v=4",
"html_url": "https:\/\/github.com\/BlackMathIT",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/BlackMathIT\/2017-11882_Generator",
"description": "CVE-2017-11882 File Generator PoC",
"fork": false,
"created_at": "2017-11-21T09:15:28Z",
"updated_at": "2024-08-12T19:34:13Z",
"pushed_at": "2017-11-22T08:38:18Z",
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 35,
"score": 0,
"subscribers_count": 2
},
{
"id": 111566147,
"name": "CVE-2017-11882",
"full_name": "rip1s\/CVE-2017-11882",
"owner": {
"login": "rip1s",
"id": 12728984,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12728984?v=4",
"html_url": "https:\/\/github.com\/rip1s",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/rip1s\/CVE-2017-11882",
"description": "CVE-2017-11882 Exploit accepts over 17k bytes long command\/code in maximum.",
"fork": false,
"created_at": "2017-11-21T15:22:41Z",
"updated_at": "2025-03-03T18:54:00Z",
"pushed_at": "2017-12-06T12:47:31Z",
"stargazers_count": 325,
"watchers_count": 325,
"has_discussions": false,
"forks_count": 94,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2017-11882",
"exploit",
"rtf",
"shellcode"
],
"visibility": "public",
"forks": 94,
"watchers": 325,
"score": 0,
"subscribers_count": 18
},
{
"id": 111585219,
"name": "CVE-2017-11882-metasploit",
"full_name": "0x09AL\/CVE-2017-11882-metasploit",
"owner": {
"login": "0x09AL",
"id": 25826294,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25826294?v=4",
"html_url": "https:\/\/github.com\/0x09AL",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0x09AL\/CVE-2017-11882-metasploit",
"description": "This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https:\/\/embedi.com\/blog\/skeleton-closet-ms-office-vulnerability-you-didnt-know-about.",
"fork": false,
"created_at": "2017-11-21T18:17:28Z",
"updated_at": "2024-12-30T08:51:48Z",
"pushed_at": "2017-11-21T20:34:57Z",
"stargazers_count": 99,
"watchers_count": 99,
"has_discussions": false,
"forks_count": 62,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 62,
"watchers": 99,
"score": 0,
"subscribers_count": 8
},
{
"id": 111601525,
"name": "ABC",
"full_name": "HZachev\/ABC",
"owner": {
"login": "HZachev",
"id": 33879843,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33879843?v=4",
"html_url": "https:\/\/github.com\/HZachev",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/HZachev\/ABC",
"description": "CVE-2017-11882",
"fork": false,
"created_at": "2017-11-21T21:07:57Z",
"updated_at": "2017-11-21T21:07:57Z",
"pushed_at": "2017-11-21T22:04:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 111619944,
"name": "CVE-2017-11882",
"full_name": "starnightcyber\/CVE-2017-11882",
"owner": {
"login": "starnightcyber",
"id": 19260696,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19260696?v=4",
"html_url": "https:\/\/github.com\/starnightcyber",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/starnightcyber\/CVE-2017-11882",
"description": "CVE-2017-11882 exploitation",
"fork": false,
"created_at": "2017-11-22T01:11:39Z",
"updated_at": "2024-08-12T19:34:15Z",
"pushed_at": "2017-11-28T03:06:32Z",
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 71,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2017-11882"
],
"visibility": "public",
"forks": 71,
"watchers": 43,
"score": 0,
"subscribers_count": 5
},
{
"id": 111637919,
"name": "CVE-2017-11882",
"full_name": "Grey-Li\/CVE-2017-11882",
"owner": {
"login": "Grey-Li",
"id": 33873392,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33873392?v=4",
"html_url": "https:\/\/github.com\/Grey-Li",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Grey-Li\/CVE-2017-11882",
"description": null,
"fork": false,
"created_at": "2017-11-22T04:53:44Z",
"updated_at": "2017-11-22T04:54:38Z",
"pushed_at": "2017-11-22T04:54:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 111887551,
"name": "CVE-2017-11882-for-Kali",
"full_name": "legendsec\/CVE-2017-11882-for-Kali",
"owner": {
"login": "legendsec",
"id": 13389492,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13389492?v=4",
"html_url": "https:\/\/github.com\/legendsec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/legendsec\/CVE-2017-11882-for-Kali",
"description": "# CVE-2017-11882-metasploit This is a Metasploit module which exploits CVE-2017-11882 using the POC below: https:\/\/embedi.com\/blog\/skeleton-closet-ms-office-vulnerability-you-didnt-know-about. ## Installation 1) Copy the cve_2017_11882.rb to \/usr\/share\/metasploit-framework\/modules\/exploits\/windows\/local\/ 2) Copy the cve-2017-11882.rtf to \/usr\/share\/metasploit-framework\/data\/exploits\/ This module is a quick port to Metasploit and uses mshta.exe to execute the payload. There are better ways to implement this module and exploit but will update it as soon as I have the time.",
"fork": false,
"created_at": "2017-11-24T07:11:13Z",
"updated_at": "2023-06-08T10:38:50Z",
"pushed_at": "2017-11-24T07:11:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 111904379,
"name": "cve-2017-11882",
"full_name": "CSC-pentest\/cve-2017-11882",
"owner": {
"login": "CSC-pentest",
"id": 33954862,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33954862?v=4",
"html_url": "https:\/\/github.com\/CSC-pentest",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/CSC-pentest\/cve-2017-11882",
"description": null,
"fork": false,
"created_at": "2017-11-24T10:09:49Z",
"updated_at": "2017-11-24T10:09:49Z",
"pushed_at": "2017-11-24T10:13:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 112133932,
"name": "CVE-2017-11882-",
"full_name": "Shadowshusky\/CVE-2017-11882-",
"owner": {
"login": "Shadowshusky",
"id": 31649758,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31649758?v=4",
"html_url": "https:\/\/github.com\/Shadowshusky",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Shadowshusky\/CVE-2017-11882-",
"description": null,
"fork": false,
"created_at": "2017-11-27T01:50:44Z",
"updated_at": "2023-12-06T03:16:35Z",
"pushed_at": "2017-11-27T01:50:52Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
{
"id": 640845395,
"name": "DetectPacket-CVE-2017-11882",
"full_name": "n18dcat053-luuvannga\/DetectPacket-CVE-2017-11882",
"owner": {
"login": "n18dcat053-luuvannga",
"id": 82393611,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82393611?v=4",
"html_url": "https:\/\/github.com\/n18dcat053-luuvannga",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/n18dcat053-luuvannga\/DetectPacket-CVE-2017-11882",
"description": null,
"fork": false,
"created_at": "2023-05-15T08:47:31Z",
"updated_at": "2023-05-15T08:51:41Z",
"pushed_at": "2023-05-15T08:51:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 711183982,
"name": "cve-2017-11882",
"full_name": "nhuynhuy\/cve-2017-11882",
"owner": {
"login": "nhuynhuy",
"id": 57981894,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57981894?v=4",
"html_url": "https:\/\/github.com\/nhuynhuy",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/nhuynhuy\/cve-2017-11882",
"description": null,
"fork": false,
"created_at": "2023-10-28T13:15:45Z",
"updated_at": "2023-10-28T13:15:46Z",
"pushed_at": "2023-10-28T13:15:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 827428106,
"name": "Dragonfish-s-Malware-Cyber-Analysis",
"full_name": "jadeapar\/Dragonfish-s-Malware-Cyber-Analysis",
"owner": {
"login": "jadeapar",
"id": 143646365,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/143646365?v=4",
"html_url": "https:\/\/github.com\/jadeapar",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jadeapar\/Dragonfish-s-Malware-Cyber-Analysis",
"description": "Examining the phases of an attack using “Dragonfish's Elise Malware”, specifically, exploring the exploitation of vulnerability CVE-2017-11882. ",
"fork": false,
"created_at": "2024-07-11T16:15:27Z",
"updated_at": "2024-07-11T16:17:25Z",
"pushed_at": "2024-07-11T16:17:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 908465504,
"name": "001-Malware-Analysis-CVE-2017-11882",
"full_name": "yaseenibnakhtar\/001-Malware-Analysis-CVE-2017-11882",
"owner": {
"login": "yaseenibnakhtar",
"id": 167536932,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/167536932?v=4",
"html_url": "https:\/\/github.com\/yaseenibnakhtar",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/yaseenibnakhtar\/001-Malware-Analysis-CVE-2017-11882",
"description": "Malware Analysis CVE-2017-11882",
"fork": false,
"created_at": "2024-12-26T06:23:27Z",
"updated_at": "2025-01-10T13:07:05Z",
"pushed_at": "2024-12-26T06:24:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]