PoC-in-GitHub/2024/CVE-2024-38063.json

642 lines
22 KiB
JSON
Raw Normal View History

2024-08-16 03:30:04 +09:00
[
{
"id": 842939338,
"name": "CVE-2024-38063",
"full_name": "diegoalbuquerque\/CVE-2024-38063",
"owner": {
"login": "diegoalbuquerque",
"id": 160813,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/160813?v=4",
"html_url": "https:\/\/github.com\/diegoalbuquerque"
},
"html_url": "https:\/\/github.com\/diegoalbuquerque\/CVE-2024-38063",
"description": "mitigation script by disabling ipv6 of all interfaces",
"fork": false,
"created_at": "2024-08-15T12:41:01Z",
2024-08-27 21:30:07 +09:00
"updated_at": "2024-08-27T10:04:08Z",
2024-08-16 03:30:04 +09:00
"pushed_at": "2024-08-15T13:53:45Z",
2024-08-27 21:30:07 +09:00
"stargazers_count": 15,
"watchers_count": 15,
2024-08-16 03:30:04 +09:00
"has_discussions": false,
2024-08-22 03:29:40 +09:00
"forks_count": 3,
2024-08-16 03:30:04 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-08-22 03:29:40 +09:00
"forks": 3,
2024-08-27 21:30:07 +09:00
"watchers": 15,
2024-08-16 15:29:42 +09:00
"score": 0,
"subscribers_count": 1
},
2024-08-17 15:29:17 +09:00
{
"id": 843636100,
"name": "CVE-2024-38063-VB",
"full_name": "noradlb1\/CVE-2024-38063-VB",
"owner": {
"login": "noradlb1",
"id": 74623428,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74623428?v=4",
"html_url": "https:\/\/github.com\/noradlb1"
},
"html_url": "https:\/\/github.com\/noradlb1\/CVE-2024-38063-VB",
"description": "CVE-2024-38063 VB",
"fork": false,
"created_at": "2024-08-17T01:11:12Z",
"updated_at": "2024-08-17T01:20:05Z",
"pushed_at": "2024-08-17T01:20:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
2024-08-16 15:29:42 +09:00
"watchers": 0,
2024-08-16 03:30:04 +09:00
"score": 0,
2024-08-18 15:29:31 +09:00
"subscribers_count": 1
2024-08-17 21:29:42 +09:00
},
2024-08-18 03:29:14 +09:00
{
"id": 843832661,
2024-08-29 09:29:11 +09:00
"name": "CVE-2024-38063-poc",
"full_name": "Sachinart\/CVE-2024-38063-poc",
2024-08-18 03:29:14 +09:00
"owner": {
"login": "Sachinart",
"id": 18497191,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18497191?v=4",
"html_url": "https:\/\/github.com\/Sachinart"
},
2024-08-29 09:29:11 +09:00
"html_url": "https:\/\/github.com\/Sachinart\/CVE-2024-38063-poc",
2024-08-18 03:29:14 +09:00
"description": "Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.",
"fork": false,
"created_at": "2024-08-17T14:58:36Z",
2024-09-25 03:31:05 +09:00
"updated_at": "2024-09-24T14:41:16Z",
2024-08-29 09:29:11 +09:00
"pushed_at": "2024-08-28T20:56:40Z",
2024-09-25 03:31:05 +09:00
"stargazers_count": 76,
"watchers_count": 76,
2024-08-18 03:29:14 +09:00
"has_discussions": false,
2024-08-29 03:29:38 +09:00
"forks_count": 27,
2024-08-17 21:29:42 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-08-29 03:29:38 +09:00
"forks": 27,
2024-09-25 03:31:05 +09:00
"watchers": 76,
2024-08-17 21:29:42 +09:00
"score": 0,
2024-08-22 15:29:46 +09:00
"subscribers_count": 4
2024-08-19 09:29:07 +09:00
},
{
"id": 844272199,
"name": "cve-2024-38063",
"full_name": "p33d\/cve-2024-38063",
"owner": {
"login": "p33d",
"id": 123099747,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123099747?v=4",
"html_url": "https:\/\/github.com\/p33d"
},
"html_url": "https:\/\/github.com\/p33d\/cve-2024-38063",
"description": "Poc for cve-2024-38063 ",
"fork": false,
"created_at": "2024-08-18T22:24:43Z",
"updated_at": "2024-08-18T22:24:43Z",
"pushed_at": "2024-08-18T22:24:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2024-08-19 15:29:34 +09:00
"subscribers_count": 1
2024-08-20 09:29:23 +09:00
},
{
"id": 844698787,
"name": "CVE-2024-38063-Remediation",
"full_name": "dweger-scripts\/CVE-2024-38063-Remediation",
"owner": {
"login": "dweger-scripts",
"id": 174140925,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/174140925?v=4",
"html_url": "https:\/\/github.com\/dweger-scripts"
},
"html_url": "https:\/\/github.com\/dweger-scripts\/CVE-2024-38063-Remediation",
"description": null,
"fork": false,
"created_at": "2024-08-19T19:44:37Z",
2024-08-22 03:29:40 +09:00
"updated_at": "2024-08-21T14:58:51Z",
"pushed_at": "2024-08-21T14:58:48Z",
2024-08-20 09:29:23 +09:00
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2024-08-20 15:29:23 +09:00
"subscribers_count": 1
2024-08-20 21:30:03 +09:00
},
{
"id": 844930990,
"name": "Disable-IPv6-CVE-2024-38063-Fix",
"full_name": "almogopp\/Disable-IPv6-CVE-2024-38063-Fix",
"owner": {
"login": "almogopp",
"id": 37026702,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37026702?v=4",
"html_url": "https:\/\/github.com\/almogopp"
},
"html_url": "https:\/\/github.com\/almogopp\/Disable-IPv6-CVE-2024-38063-Fix",
"description": "A PowerShell script to temporarily mitigate the CVE-2024-38063 vulnerability by disabling IPv6 on Windows systems. This workaround modifies the registry to reduce the risk of exploitation without needing the immediate installation of the official Microsoft KB update. Intended as a temporary fix",
"fork": false,
"created_at": "2024-08-20T08:48:08Z",
"updated_at": "2024-08-20T08:50:31Z",
"pushed_at": "2024-08-20T08:50:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2024-08-21 15:29:34 +09:00
"subscribers_count": 1
2024-08-23 15:29:28 +09:00
},
{
"id": 846408465,
"name": "CVE-2024-38063",
"full_name": "Th3Tr1ckst3r\/CVE-2024-38063",
"owner": {
"login": "Th3Tr1ckst3r",
"id": 21149460,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21149460?v=4",
"html_url": "https:\/\/github.com\/Th3Tr1ckst3r"
},
"html_url": "https:\/\/github.com\/Th3Tr1ckst3r\/CVE-2024-38063",
"description": "CVE-2024-38063 research so you don't have to.",
"fork": false,
"created_at": "2024-08-23T06:28:03Z",
2024-08-31 15:29:22 +09:00
"updated_at": "2024-08-31T00:54:01Z",
2024-08-31 09:29:30 +09:00
"pushed_at": "2024-08-30T22:18:44Z",
2024-08-31 15:29:22 +09:00
"stargazers_count": 2,
"watchers_count": 2,
2024-08-23 15:29:28 +09:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": true,
"topics": [
"cve-2024-38063",
"cve-2024-38063-poc"
],
"visibility": "public",
"forks": 0,
2024-08-31 15:29:22 +09:00
"watchers": 2,
2024-08-23 15:29:28 +09:00
"score": 0,
2024-08-24 15:29:21 +09:00
"subscribers_count": 1
2024-08-25 03:29:26 +09:00
},
{
"id": 846999955,
"name": "CVE-2024-38063-Research-Tool",
"full_name": "haroonawanofficial\/CVE-2024-38063-Research-Tool",
"owner": {
"login": "haroonawanofficial",
"id": 148648539,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148648539?v=4",
"html_url": "https:\/\/github.com\/haroonawanofficial"
},
"html_url": "https:\/\/github.com\/haroonawanofficial\/CVE-2024-38063-Research-Tool",
2024-08-31 03:29:44 +09:00
"description": "This is a functional proof of concept (PoC) for CVE-2024-38063. However, it's important to note that this CVE is theoretical and not exploitable in a real-world scenario. To enhance understanding for learners, I have developed a research tool that covers both past and newly reported TCP\/IP vulnerabilities in CVEs",
2024-08-25 03:29:26 +09:00
"fork": false,
"created_at": "2024-08-24T15:04:54Z",
2024-09-03 09:29:28 +09:00
"updated_at": "2024-09-02T19:52:37Z",
2024-08-26 15:29:24 +09:00
"pushed_at": "2024-08-26T06:18:08Z",
2024-09-03 09:29:28 +09:00
"stargazers_count": 4,
"watchers_count": 4,
2024-08-25 03:29:26 +09:00
"has_discussions": false,
2024-08-25 21:29:08 +09:00
"forks_count": 1,
2024-08-25 03:29:26 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-08-25 21:29:08 +09:00
"forks": 1,
2024-09-03 09:29:28 +09:00
"watchers": 4,
2024-08-25 03:29:26 +09:00
"score": 0,
2024-08-25 15:29:13 +09:00
"subscribers_count": 1
2024-08-25 09:29:15 +09:00
},
{
"id": 847061153,
"name": "CVE-2024-38063",
"full_name": "ynwarcs\/CVE-2024-38063",
"owner": {
"login": "ynwarcs",
"id": 108408574,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108408574?v=4",
"html_url": "https:\/\/github.com\/ynwarcs"
},
"html_url": "https:\/\/github.com\/ynwarcs\/CVE-2024-38063",
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
"fork": false,
"created_at": "2024-08-24T18:25:46Z",
2024-09-25 09:30:43 +09:00
"updated_at": "2024-09-24T23:55:18Z",
2024-08-27 21:30:07 +09:00
"pushed_at": "2024-08-27T12:22:39Z",
2024-09-25 09:30:43 +09:00
"stargazers_count": 588,
"watchers_count": 588,
2024-08-25 09:29:15 +09:00
"has_discussions": false,
2024-09-24 16:46:45 +09:00
"forks_count": 106,
2024-08-25 09:29:15 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-09-24 16:46:45 +09:00
"forks": 106,
2024-09-25 09:30:43 +09:00
"watchers": 588,
2024-08-25 09:29:15 +09:00
"score": 0,
2024-08-30 15:29:36 +09:00
"subscribers_count": 4
2024-08-28 03:29:36 +09:00
},
{
"id": 848337529,
"name": "CVE-2024-38063",
"full_name": "patchpoint\/CVE-2024-38063",
"owner": {
"login": "patchpoint",
"id": 174953042,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/174953042?v=4",
"html_url": "https:\/\/github.com\/patchpoint"
},
"html_url": "https:\/\/github.com\/patchpoint\/CVE-2024-38063",
"description": null,
"fork": false,
"created_at": "2024-08-27T15:21:25Z",
2024-09-13 21:30:19 +09:00
"updated_at": "2024-09-13T09:14:16Z",
2024-08-28 03:29:36 +09:00
"pushed_at": "2024-08-27T17:48:16Z",
2024-09-13 21:30:19 +09:00
"stargazers_count": 16,
"watchers_count": 16,
2024-08-28 15:29:31 +09:00
"has_discussions": false,
2024-08-30 15:29:36 +09:00
"forks_count": 2,
2024-08-28 15:29:31 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-08-30 15:29:36 +09:00
"forks": 2,
2024-09-13 21:30:19 +09:00
"watchers": 16,
2024-08-28 15:29:31 +09:00
"score": 0,
"subscribers_count": 2
},
{
"id": 848561863,
"name": "Windows-CVE-2024-38063",
"full_name": "PumpkinBridge\/Windows-CVE-2024-38063",
"owner": {
"login": "PumpkinBridge",
"id": 139355470,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/139355470?v=4",
"html_url": "https:\/\/github.com\/PumpkinBridge"
},
"html_url": "https:\/\/github.com\/PumpkinBridge\/Windows-CVE-2024-38063",
"description": "Windows TCP\/IP IPv6(CVE-2024-38063)",
"fork": false,
"created_at": "2024-08-28T01:46:44Z",
2024-09-10 03:29:56 +09:00
"updated_at": "2024-09-09T16:51:33Z",
2024-08-28 15:29:31 +09:00
"pushed_at": "2024-08-28T01:53:43Z",
2024-09-10 03:29:56 +09:00
"stargazers_count": 3,
"watchers_count": 3,
2024-08-28 03:29:36 +09:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
2024-09-10 03:29:56 +09:00
"watchers": 3,
2024-08-28 03:29:36 +09:00
"score": 0,
2024-08-29 15:29:25 +09:00
"subscribers_count": 1
2024-08-28 21:29:42 +09:00
},
{
"id": 848706606,
"name": "CVE-2024-38063-POC",
"full_name": "zenzue\/CVE-2024-38063-POC",
"owner": {
"login": "zenzue",
"id": 19271340,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19271340?v=4",
"html_url": "https:\/\/github.com\/zenzue"
},
"html_url": "https:\/\/github.com\/zenzue\/CVE-2024-38063-POC",
"description": "potential memory corruption vulnerabilities in IPv6 networks.",
"fork": false,
"created_at": "2024-08-28T08:57:23Z",
2024-09-24 21:31:13 +09:00
"updated_at": "2024-09-24T10:44:23Z",
2024-08-28 21:29:42 +09:00
"pushed_at": "2024-08-28T09:02:59Z",
2024-09-24 21:31:13 +09:00
"stargazers_count": 5,
"watchers_count": 5,
2024-08-28 21:29:42 +09:00
"has_discussions": false,
2024-09-09 09:29:39 +09:00
"forks_count": 4,
2024-08-28 21:29:42 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-09-09 09:29:39 +09:00
"forks": 4,
2024-09-24 21:31:13 +09:00
"watchers": 5,
2024-08-28 21:29:42 +09:00
"score": 0,
2024-08-29 15:29:25 +09:00
"subscribers_count": 1
2024-08-29 03:29:38 +09:00
},
{
"id": 848885997,
"name": "CVE-2024-38063-",
"full_name": "AdminPentester\/CVE-2024-38063-",
"owner": {
"login": "AdminPentester",
"id": 179179494,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179179494?v=4",
"html_url": "https:\/\/github.com\/AdminPentester"
},
"html_url": "https:\/\/github.com\/AdminPentester\/CVE-2024-38063-",
"description": "Remotely Exploiting The Kernel Via IPv6",
"fork": false,
"created_at": "2024-08-28T15:28:14Z",
2024-08-30 15:29:36 +09:00
"updated_at": "2024-08-30T01:27:19Z",
"pushed_at": "2024-08-30T01:27:16Z",
2024-08-29 15:29:25 +09:00
"stargazers_count": 1,
"watchers_count": 1,
2024-08-29 03:29:38 +09:00
"has_discussions": false,
2024-09-13 03:30:50 +09:00
"forks_count": 1,
2024-08-29 03:29:38 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-09-13 03:30:50 +09:00
"forks": 1,
2024-08-29 15:29:25 +09:00
"watchers": 1,
2024-08-29 03:29:38 +09:00
"score": 0,
2024-08-29 15:29:25 +09:00
"subscribers_count": 1
2024-09-01 03:29:13 +09:00
},
{
"id": 850339397,
"name": "CVE-2024-38063",
"full_name": "ThemeHackers\/CVE-2024-38063",
"owner": {
"login": "ThemeHackers",
"id": 107047730,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107047730?v=4",
"html_url": "https:\/\/github.com\/ThemeHackers"
},
"html_url": "https:\/\/github.com\/ThemeHackers\/CVE-2024-38063",
"description": "CVE-2024-38063 is a critical security vulnerability in the Windows TCP\/IP stack that allows for remote code execution (RCE)",
"fork": false,
"created_at": "2024-08-31T13:56:26Z",
2024-09-24 16:46:45 +09:00
"updated_at": "2024-09-22T02:29:01Z",
2024-09-14 03:30:25 +09:00
"pushed_at": "2024-09-13T14:30:18Z",
2024-09-24 16:46:45 +09:00
"stargazers_count": 9,
"watchers_count": 9,
2024-09-01 03:29:13 +09:00
"has_discussions": false,
2024-09-14 21:29:59 +09:00
"forks_count": 1,
2024-09-01 03:29:13 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-09-14 21:29:59 +09:00
"forks": 1,
2024-09-24 16:46:45 +09:00
"watchers": 9,
2024-09-01 03:29:13 +09:00
"score": 0,
2024-09-01 21:29:36 +09:00
"subscribers_count": 1
},
{
"id": 850609409,
"name": "CVE-2024-38063_PoC",
"full_name": "KernelKraze\/CVE-2024-38063_PoC",
"owner": {
"login": "KernelKraze",
"id": 82752974,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82752974?v=4",
"html_url": "https:\/\/github.com\/KernelKraze"
},
"html_url": "https:\/\/github.com\/KernelKraze\/CVE-2024-38063_PoC",
"description": "This is a C language program designed to test the Windows TCP\/IP Remote Code Execution Vulnerability (CVE-2024-38063). It sends specially crafted IPv6 packets with embedded shellcode to exploit the vulnerability.",
"fork": false,
"created_at": "2024-09-01T09:20:02Z",
2024-09-08 21:29:29 +09:00
"updated_at": "2024-09-08T07:13:18Z",
"pushed_at": "2024-09-08T07:12:26Z",
2024-09-08 09:29:35 +09:00
"stargazers_count": 3,
"watchers_count": 3,
2024-09-01 21:29:36 +09:00
"has_discussions": false,
2024-09-02 21:30:09 +09:00
"forks_count": 1,
2024-09-01 21:29:36 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-09-02 21:30:09 +09:00
"forks": 1,
2024-09-08 09:29:35 +09:00
"watchers": 3,
2024-09-01 21:29:36 +09:00
"score": 0,
2024-09-02 15:29:51 +09:00
"subscribers_count": 1
2024-09-03 03:29:37 +09:00
},
{
"id": 851150728,
"name": "cve-2024-38063",
"full_name": "ps-interactive\/cve-2024-38063",
"owner": {
"login": "ps-interactive",
"id": 35313392,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35313392?v=4",
"html_url": "https:\/\/github.com\/ps-interactive"
},
"html_url": "https:\/\/github.com\/ps-interactive\/cve-2024-38063",
"description": null,
"fork": false,
"created_at": "2024-09-02T14:16:31Z",
"updated_at": "2024-09-02T14:16:55Z",
"pushed_at": "2024-09-02T14:16:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2024-09-03 15:29:43 +09:00
"subscribers_count": 4
2024-09-04 03:30:11 +09:00
},
{
"id": 851683675,
"name": "Cve-2024-38063",
"full_name": "Brownpanda29\/Cve-2024-38063",
"owner": {
"login": "Brownpanda29",
"id": 147920175,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/147920175?v=4",
"html_url": "https:\/\/github.com\/Brownpanda29"
},
"html_url": "https:\/\/github.com\/Brownpanda29\/Cve-2024-38063",
"description": null,
"fork": false,
"created_at": "2024-09-03T14:36:35Z",
"updated_at": "2024-09-03T14:59:43Z",
"pushed_at": "2024-09-03T14:59:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
2024-09-09 09:29:39 +09:00
"forks_count": 2,
2024-09-04 03:30:11 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-09-09 09:29:39 +09:00
"forks": 2,
2024-09-04 03:30:11 +09:00
"watchers": 0,
"score": 0,
2024-09-04 21:30:24 +09:00
"subscribers_count": 1
2024-09-08 03:29:28 +09:00
},
{
"id": 853823211,
"name": "quick-fix-cve-2024-38063",
"full_name": "FrancescoDiSalesGithub\/quick-fix-cve-2024-38063",
"owner": {
"login": "FrancescoDiSalesGithub",
"id": 17337009,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17337009?v=4",
"html_url": "https:\/\/github.com\/FrancescoDiSalesGithub"
},
"html_url": "https:\/\/github.com\/FrancescoDiSalesGithub\/quick-fix-cve-2024-38063",
"description": "quick powershell script to fix cve-2024-38063",
"fork": false,
"created_at": "2024-09-07T16:27:27Z",
2024-09-08 21:29:29 +09:00
"updated_at": "2024-09-08T08:59:32Z",
"pushed_at": "2024-09-08T08:59:29Z",
2024-09-08 03:29:28 +09:00
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"blueteam",
"cve-2024-38063",
"fix",
"powershell",
"script",
"workaround"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2024-09-08 15:29:43 +09:00
"subscribers_count": 1
2024-09-10 21:30:06 +09:00
},
{
"id": 855027111,
"name": "CVE-2024-38063",
"full_name": "Faizan-Khanx\/CVE-2024-38063",
"owner": {
"login": "Faizan-Khanx",
"id": 156709479,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/156709479?v=4",
"html_url": "https:\/\/github.com\/Faizan-Khanx"
},
"html_url": "https:\/\/github.com\/Faizan-Khanx\/CVE-2024-38063",
"description": "CVE-2024-38063 - Remotely Exploiting The Kernel Via IPv6",
"fork": false,
"created_at": "2024-09-10T07:15:20Z",
"updated_at": "2024-09-10T12:34:53Z",
"pushed_at": "2024-09-10T10:19:14Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
2024-09-11 15:30:05 +09:00
"subscribers_count": 2
2024-09-24 16:46:45 +09:00
},
{
"id": 860985934,
"name": "CVE-2024-38063-Medium",
"full_name": "ArenaldyP\/CVE-2024-38063-Medium",
"owner": {
"login": "ArenaldyP",
"id": 134998695,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/134998695?v=4",
"html_url": "https:\/\/github.com\/ArenaldyP"
},
"html_url": "https:\/\/github.com\/ArenaldyP\/CVE-2024-38063-Medium",
"description": "Kode Eksploitasi CVE-2024-38063",
"fork": false,
"created_at": "2024-09-21T17:33:52Z",
"updated_at": "2024-09-22T16:03:48Z",
"pushed_at": "2024-09-22T16:03:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 861711766,
"name": "cve-2024-38063",
"full_name": "lnx-dvlpr\/cve-2024-38063",
"owner": {
"login": "lnx-dvlpr",
"id": 169969340,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/169969340?v=4",
"html_url": "https:\/\/github.com\/lnx-dvlpr"
},
"html_url": "https:\/\/github.com\/lnx-dvlpr\/cve-2024-38063",
"description": null,
"fork": false,
"created_at": "2024-09-23T11:45:42Z",
"updated_at": "2024-09-23T11:47:02Z",
"pushed_at": "2024-09-23T11:46:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
2024-08-16 03:30:04 +09:00
}
]