尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Microsoft | Windows 7 | 32-bit Systems Service Pack 1 | - | |
| Microsoft | Windows Server 2012 R2 | (Server Core installation) | - | |
| Microsoft | Windows RT 8.1 | Windows RT 8.1 | - | |
| Microsoft | Windows Server 2008 | 32-bit Systems Service Pack 2 | - | |
| Microsoft | Windows Server 2012 | (Server Core installation) | - | |
| Microsoft | Windows 8.1 | 32-bit systems | - | |
| Microsoft | Windows Server 2016 | (Server Core installation) | - | |
| Microsoft | Windows Server 2008 R2 | Itanium-Based Systems Service Pack 1 | - | |
| Microsoft | Windows 10 | 32-bit Systems | - | |
| Microsoft | Windows 10 Servers | version 1709 (Server Core Installation) | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | CVE-2018-8174 - VBScript memory corruption exploit. | https://github.com/0x09AL/CVE-2018-8174-msf | POC详情 |
| 2 | CVE-2018-8174_python | https://github.com/Yt1g3r/CVE-2018-8174_EXP | POC详情 |
| 3 | MS Word MS WordPad via IE VBS Engine RCE | https://github.com/SyFi/CVE-2018-8174 | POC详情 |
| 4 | Rig Exploit for CVE-2018-8174 As with its previous campaigns, Rig’s Seamless campaign uses malvertising. In this case, the malvertisements have a hidden iframe that redirects victims to Rig’s landing page, which includes an exploit for CVE-2018-8174 and shellcode. This enables remote code execution of the shellcode obfuscated in the landing page. After successful exploitation, a second-stage downloader is retrieved, which appears to be a variant of SmokeLoader due to the URL. It would then download the final payload, a Monero miner. | https://github.com/orf53975/Rig-Exploit-for-CVE-2018-8174 | POC详情 |
| 5 | Analysis of VBS exploit CVE-2018-8174 | https://github.com/piotrflorczyk/cve-2018-8174_analysis | POC详情 |
| 6 | None | https://github.com/likescam/CVE-2018-8174-msf | POC详情 |
| 7 | None | https://github.com/ericisnotrealname/CVE-2018-8174_EXP | POC详情 |
| 8 | None | https://github.com/www201001/https-github.com-iBearcat-CVE-2018-8174_EXP | POC详情 |
| 9 | None | https://github.com/www201001/https-github.com-iBearcat-CVE-2018-8174_EXP.git- | POC详情 |
| 10 | None | https://github.com/delina1/CVE-2018-8174 | POC详情 |
| 11 | None | https://github.com/delina1/CVE-2018-8174_EXP | POC详情 |
| 12 | None | https://github.com/DarkFlameMaster-bit/CVE-2018-8174_EXP | POC详情 |
| 13 | None | https://github.com/lisinan988/CVE-2018-8174-exp | POC详情 |
| 14 | None | https://github.com/sinisterghost/https-github.com-iBearcat-CVE-2018-8174_EXP | POC详情 |
| 15 | None | https://github.com/likekabin/CVE-2018-8174-msf | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论