{"vulnerability": "cve-2018-8495", "sightings": [{"uuid": "de58b942-b7af-4b15-a2ef-1d7f6c98e05c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-8495", "type": "seen", "source": "MISP/5bc4c22d-8e88-4ab6-abfc-49410a021402", "content": "", "creation_timestamp": "2018-10-15T16:43:01.000000Z"}, {"uuid": "e9d966b3-1635-4b08-b7d9-f5e20c324249", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-8495", "type": "seen", "source": "MISP/ab0b745f-bbd5-338e-8b92-97dd0c757e9d", "content": "", "creation_timestamp": "2025-08-31T03:00:49.000000Z"}, {"uuid": "545708e6-ff27-44e0-aab4-227c3af31528", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-8495", "type": "published-proof-of-concept", "source": "https://t.me/news4hack/285", "content": "Microsoft Edge RCE - (CVE-2018-8495) - Abdulrahman Al-Qabandi\nhttps://leucosite.com/Microsoft-Edge-RCE/", "creation_timestamp": "2019-02-20T21:01:48.000000Z"}, {"uuid": "e5c488c2-64d8-4a0d-9ba7-e204e1757f23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-8495", "type": "exploited", "source": "https://t.me/antichat/3692", "content": "MS Edge RCE (CVE-2018-8495). Chaining a few bugs in Edge I was able to achieve remote code execution by mainly abusing custom URI schemes.\n\nArticle: https://leucosite.com/Microsoft-Edge-RCE/\nPOC: https://github.com/kmkz/exploit/blob/master/CVE-2018-8495.html\n\n#browser #edge #rce #expdev #darw1n", "creation_timestamp": "2019-02-20T16:29:05.000000Z"}, {"uuid": "6a64d344-1d31-4b5c-9823-ea1b98c4f238", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-8495", "type": "exploited", "source": "https://t.me/R0_Crew/957", "content": "MS Edge RCE (CVE-2018-8495). Chaining a few bugs in Edge to be able achieve remote code execution by mainly abusing custom URI schemes.\n\nArticle: \nhttps://leucosite.com/Microsoft-Edge-RCE/\n\nPOC: \nhttps://github.com/kmkz/exploit/blob/master/CVE-2018-8495.html\n\n#browser #edge #rce #expdev #darw1n", "creation_timestamp": "2019-03-15T01:59:02.000000Z"}, {"uuid": "d612db11-ad6f-4033-a04a-b27a69414932", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-8495", "type": "published-proof-of-concept", "source": "https://t.me/DC8044_Info/92", "content": "Microsoft Edge RCE, CVE-2018-8495 + exploit\nhttps://leucosite.com/Microsoft-Edge-RCE/", "creation_timestamp": "2019-02-20T13:25:26.000000Z"}, {"uuid": "505ce04c-b717-43d0-a8a4-d8f5ef226a28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-8495", "type": "published-proof-of-concept", "source": "https://t.me/mis_team/19", "content": "\u0413\u043e\u0440\u044f\u0447\u0438\u0435 \u0440\u0430\u0437\u0431\u043e\u0440 \u043e\u0442 \u0433\u043e\u0440\u044f\u0447\u0435\u0439 CVE-2018-8495\n\n\u041d\u0430\u0441\u0442\u043e\u043b\u044c\u043a\u043e \u0433\u043e\u0440\u044f\u0447\u0435\u0439, \u0447\u0442\u043e \u0435\u0449\u0451 cvss \u0434\u043b\u044f \u043d\u0435\u0435 \u043d\u0435 \u043f\u043e\u0441\u0447\u0438\u0442\u0430\u043d\n\nhttps://leucosite.com/Microsoft-Edge-RCE/", "creation_timestamp": "2018-10-12T08:57:59.000000Z"}, {"uuid": "ec035c5a-9579-443c-bfce-557d339c8cc3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-8495", "type": "published-proof-of-concept", "source": "https://t.me/SecLabNews/3370", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u0432 \u043e\u0431\u043b\u0430\u0441\u0442\u0438 \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0410\u0431\u0434\u0443\u043b\u044c\u0440\u0430\u0445\u043c\u0430\u043d \u0410\u043b\u044c-\u041a\u0430\u0431\u0430\u043d\u0434\u0438 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b PoC-\u043a\u043e\u0434 \u0434\u043b\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2018-8495 \u0432 \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0435 Microsoft Edge, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0435\u0439 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043a\u043e\u0434.    \n\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u0434\u043b\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 Microsoft Edge", "creation_timestamp": "2018-10-12T08:03:19.000000Z"}]}