Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2018-8174
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka "Windows VBScript Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Windows VBScript引擎缓冲区错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Windows 7等都是美国微软(Microsoft)公司发布的一系列操作系统。Windows VBScript engine是其中的一个VBScript(脚本语言)引擎。 Microsoft Windows VBScript引擎中存在远程代码执行漏洞。远程攻击者可利用该漏洞在当前用户的上下文中执行任意代码,造成内存损坏。以下系统版本受到影响:Microsoft Windows 7,Windows Server 2012 R2,Windows RT 8.1,Windows Server
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
MicrosoftWindows 7 32-bit Systems Service Pack 1 -
MicrosoftWindows Server 2012 R2 (Server Core installation) -
MicrosoftWindows RT 8.1 Windows RT 8.1 -
MicrosoftWindows Server 2008 32-bit Systems Service Pack 2 -
MicrosoftWindows Server 2012 (Server Core installation) -
MicrosoftWindows 8.1 32-bit systems -
MicrosoftWindows Server 2016 (Server Core installation) -
MicrosoftWindows Server 2008 R2 Itanium-Based Systems Service Pack 1 -
MicrosoftWindows 10 32-bit Systems -
MicrosoftWindows 10 Servers version 1709 (Server Core Installation) -
II. Public POCs for CVE-2018-8174
#POC DescriptionSource LinkShenlong Link
1CVE-2018-8174 - VBScript memory corruption exploit.https://github.com/0x09AL/CVE-2018-8174-msfPOC Details
2CVE-2018-8174_pythonhttps://github.com/Yt1g3r/CVE-2018-8174_EXPPOC Details
3MS Word MS WordPad via IE VBS Engine RCE https://github.com/SyFi/CVE-2018-8174POC Details
4Rig Exploit for CVE-2018-8174 As with its previous campaigns, Rig’s Seamless campaign uses malvertising. In this case, the malvertisements have a hidden iframe that redirects victims to Rig’s landing page, which includes an exploit for CVE-2018-8174 and shellcode. This enables remote code execution of the shellcode obfuscated in the landing page. After successful exploitation, a second-stage downloader is retrieved, which appears to be a variant of SmokeLoader due to the URL. It would then download the final payload, a Monero miner.https://github.com/orf53975/Rig-Exploit-for-CVE-2018-8174POC Details
5Analysis of VBS exploit CVE-2018-8174https://github.com/piotrflorczyk/cve-2018-8174_analysisPOC Details
6Nonehttps://github.com/likescam/CVE-2018-8174-msfPOC Details
7Nonehttps://github.com/ericisnotrealname/CVE-2018-8174_EXPPOC Details
8Nonehttps://github.com/www201001/https-github.com-iBearcat-CVE-2018-8174_EXPPOC Details
9Nonehttps://github.com/www201001/https-github.com-iBearcat-CVE-2018-8174_EXP.git-POC Details
10Nonehttps://github.com/delina1/CVE-2018-8174POC Details
11Nonehttps://github.com/delina1/CVE-2018-8174_EXPPOC Details
12Nonehttps://github.com/DarkFlameMaster-bit/CVE-2018-8174_EXPPOC Details
13Nonehttps://github.com/lisinan988/CVE-2018-8174-expPOC Details
14Nonehttps://github.com/sinisterghost/https-github.com-iBearcat-CVE-2018-8174_EXPPOC Details
15Nonehttps://github.com/likekabin/CVE-2018-8174-msfPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2018-8174
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2018-8174

No comments yet


Leave a comment