Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft | Windows 7 | 32-bit Systems Service Pack 1 | - | |
| Microsoft | Windows Server 2012 R2 | (Server Core installation) | - | |
| Microsoft | Windows RT 8.1 | Windows RT 8.1 | - | |
| Microsoft | Windows Server 2008 | 32-bit Systems Service Pack 2 | - | |
| Microsoft | Windows Server 2012 | (Server Core installation) | - | |
| Microsoft | Windows 8.1 | 32-bit systems | - | |
| Microsoft | Windows Server 2016 | (Server Core installation) | - | |
| Microsoft | Windows Server 2008 R2 | Itanium-Based Systems Service Pack 1 | - | |
| Microsoft | Windows 10 | 32-bit Systems | - | |
| Microsoft | Windows 10 Servers | version 1709 (Server Core Installation) | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2018-8174 - VBScript memory corruption exploit. | https://github.com/0x09AL/CVE-2018-8174-msf | POC Details |
| 2 | CVE-2018-8174_python | https://github.com/Yt1g3r/CVE-2018-8174_EXP | POC Details |
| 3 | MS Word MS WordPad via IE VBS Engine RCE | https://github.com/SyFi/CVE-2018-8174 | POC Details |
| 4 | Rig Exploit for CVE-2018-8174 As with its previous campaigns, Rig’s Seamless campaign uses malvertising. In this case, the malvertisements have a hidden iframe that redirects victims to Rig’s landing page, which includes an exploit for CVE-2018-8174 and shellcode. This enables remote code execution of the shellcode obfuscated in the landing page. After successful exploitation, a second-stage downloader is retrieved, which appears to be a variant of SmokeLoader due to the URL. It would then download the final payload, a Monero miner. | https://github.com/orf53975/Rig-Exploit-for-CVE-2018-8174 | POC Details |
| 5 | Analysis of VBS exploit CVE-2018-8174 | https://github.com/piotrflorczyk/cve-2018-8174_analysis | POC Details |
| 6 | None | https://github.com/likescam/CVE-2018-8174-msf | POC Details |
| 7 | None | https://github.com/ericisnotrealname/CVE-2018-8174_EXP | POC Details |
| 8 | None | https://github.com/www201001/https-github.com-iBearcat-CVE-2018-8174_EXP | POC Details |
| 9 | None | https://github.com/www201001/https-github.com-iBearcat-CVE-2018-8174_EXP.git- | POC Details |
| 10 | None | https://github.com/delina1/CVE-2018-8174 | POC Details |
| 11 | None | https://github.com/delina1/CVE-2018-8174_EXP | POC Details |
| 12 | None | https://github.com/DarkFlameMaster-bit/CVE-2018-8174_EXP | POC Details |
| 13 | None | https://github.com/lisinan988/CVE-2018-8174-exp | POC Details |
| 14 | None | https://github.com/sinisterghost/https-github.com-iBearcat-CVE-2018-8174_EXP | POC Details |
| 15 | None | https://github.com/likekabin/CVE-2018-8174-msf | POC Details |
No public POC found.
Login to generate AI POCNo comments yet