PoC-in-GitHub/2024/CVE-2024-38063.json

455 lines
16 KiB
JSON
Raw Normal View History

2024-08-16 03:30:04 +09:00
[
{
"id": 842939338,
"name": "CVE-2024-38063",
"full_name": "diegoalbuquerque\/CVE-2024-38063",
"owner": {
"login": "diegoalbuquerque",
"id": 160813,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/160813?v=4",
"html_url": "https:\/\/github.com\/diegoalbuquerque"
},
"html_url": "https:\/\/github.com\/diegoalbuquerque\/CVE-2024-38063",
"description": "mitigation script by disabling ipv6 of all interfaces",
"fork": false,
"created_at": "2024-08-15T12:41:01Z",
2024-08-27 21:30:07 +09:00
"updated_at": "2024-08-27T10:04:08Z",
2024-08-16 03:30:04 +09:00
"pushed_at": "2024-08-15T13:53:45Z",
2024-08-27 21:30:07 +09:00
"stargazers_count": 15,
"watchers_count": 15,
2024-08-16 03:30:04 +09:00
"has_discussions": false,
2024-08-22 03:29:40 +09:00
"forks_count": 3,
2024-08-16 03:30:04 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-08-22 03:29:40 +09:00
"forks": 3,
2024-08-27 21:30:07 +09:00
"watchers": 15,
2024-08-16 15:29:42 +09:00
"score": 0,
"subscribers_count": 1
},
2024-08-17 15:29:17 +09:00
{
"id": 843636100,
"name": "CVE-2024-38063-VB",
"full_name": "noradlb1\/CVE-2024-38063-VB",
"owner": {
"login": "noradlb1",
"id": 74623428,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74623428?v=4",
"html_url": "https:\/\/github.com\/noradlb1"
},
"html_url": "https:\/\/github.com\/noradlb1\/CVE-2024-38063-VB",
"description": "CVE-2024-38063 VB",
"fork": false,
"created_at": "2024-08-17T01:11:12Z",
"updated_at": "2024-08-17T01:20:05Z",
"pushed_at": "2024-08-17T01:20:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
2024-08-16 15:29:42 +09:00
"watchers": 0,
2024-08-16 03:30:04 +09:00
"score": 0,
2024-08-18 15:29:31 +09:00
"subscribers_count": 1
2024-08-17 21:29:42 +09:00
},
2024-08-18 03:29:14 +09:00
{
"id": 843832661,
2024-08-29 09:29:11 +09:00
"name": "CVE-2024-38063-poc",
"full_name": "Sachinart\/CVE-2024-38063-poc",
2024-08-18 03:29:14 +09:00
"owner": {
"login": "Sachinart",
"id": 18497191,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18497191?v=4",
"html_url": "https:\/\/github.com\/Sachinart"
},
2024-08-29 09:29:11 +09:00
"html_url": "https:\/\/github.com\/Sachinart\/CVE-2024-38063-poc",
2024-08-18 03:29:14 +09:00
"description": "Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.",
"fork": false,
"created_at": "2024-08-17T14:58:36Z",
2024-09-02 03:29:16 +09:00
"updated_at": "2024-09-01T16:34:32Z",
2024-08-29 09:29:11 +09:00
"pushed_at": "2024-08-28T20:56:40Z",
2024-09-02 03:29:16 +09:00
"stargazers_count": 70,
"watchers_count": 70,
2024-08-18 03:29:14 +09:00
"has_discussions": false,
2024-08-29 03:29:38 +09:00
"forks_count": 27,
2024-08-17 21:29:42 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-08-29 03:29:38 +09:00
"forks": 27,
2024-09-02 03:29:16 +09:00
"watchers": 70,
2024-08-17 21:29:42 +09:00
"score": 0,
2024-08-22 15:29:46 +09:00
"subscribers_count": 4
2024-08-19 09:29:07 +09:00
},
{
"id": 844272199,
"name": "cve-2024-38063",
"full_name": "p33d\/cve-2024-38063",
"owner": {
"login": "p33d",
"id": 123099747,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123099747?v=4",
"html_url": "https:\/\/github.com\/p33d"
},
"html_url": "https:\/\/github.com\/p33d\/cve-2024-38063",
"description": "Poc for cve-2024-38063 ",
"fork": false,
"created_at": "2024-08-18T22:24:43Z",
"updated_at": "2024-08-18T22:24:43Z",
"pushed_at": "2024-08-18T22:24:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2024-08-19 15:29:34 +09:00
"subscribers_count": 1
2024-08-20 09:29:23 +09:00
},
{
"id": 844698787,
"name": "CVE-2024-38063-Remediation",
"full_name": "dweger-scripts\/CVE-2024-38063-Remediation",
"owner": {
"login": "dweger-scripts",
"id": 174140925,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/174140925?v=4",
"html_url": "https:\/\/github.com\/dweger-scripts"
},
"html_url": "https:\/\/github.com\/dweger-scripts\/CVE-2024-38063-Remediation",
"description": null,
"fork": false,
"created_at": "2024-08-19T19:44:37Z",
2024-08-22 03:29:40 +09:00
"updated_at": "2024-08-21T14:58:51Z",
"pushed_at": "2024-08-21T14:58:48Z",
2024-08-20 09:29:23 +09:00
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2024-08-20 15:29:23 +09:00
"subscribers_count": 1
2024-08-20 21:30:03 +09:00
},
{
"id": 844930990,
"name": "Disable-IPv6-CVE-2024-38063-Fix",
"full_name": "almogopp\/Disable-IPv6-CVE-2024-38063-Fix",
"owner": {
"login": "almogopp",
"id": 37026702,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37026702?v=4",
"html_url": "https:\/\/github.com\/almogopp"
},
"html_url": "https:\/\/github.com\/almogopp\/Disable-IPv6-CVE-2024-38063-Fix",
"description": "A PowerShell script to temporarily mitigate the CVE-2024-38063 vulnerability by disabling IPv6 on Windows systems. This workaround modifies the registry to reduce the risk of exploitation without needing the immediate installation of the official Microsoft KB update. Intended as a temporary fix",
"fork": false,
"created_at": "2024-08-20T08:48:08Z",
"updated_at": "2024-08-20T08:50:31Z",
"pushed_at": "2024-08-20T08:50:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2024-08-21 15:29:34 +09:00
"subscribers_count": 1
2024-08-23 15:29:28 +09:00
},
{
"id": 846408465,
"name": "CVE-2024-38063",
"full_name": "Th3Tr1ckst3r\/CVE-2024-38063",
"owner": {
"login": "Th3Tr1ckst3r",
"id": 21149460,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21149460?v=4",
"html_url": "https:\/\/github.com\/Th3Tr1ckst3r"
},
"html_url": "https:\/\/github.com\/Th3Tr1ckst3r\/CVE-2024-38063",
"description": "CVE-2024-38063 research so you don't have to.",
"fork": false,
"created_at": "2024-08-23T06:28:03Z",
2024-08-31 15:29:22 +09:00
"updated_at": "2024-08-31T00:54:01Z",
2024-08-31 09:29:30 +09:00
"pushed_at": "2024-08-30T22:18:44Z",
2024-08-31 15:29:22 +09:00
"stargazers_count": 2,
"watchers_count": 2,
2024-08-23 15:29:28 +09:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": true,
"topics": [
"cve-2024-38063",
"cve-2024-38063-poc"
],
"visibility": "public",
"forks": 0,
2024-08-31 15:29:22 +09:00
"watchers": 2,
2024-08-23 15:29:28 +09:00
"score": 0,
2024-08-24 15:29:21 +09:00
"subscribers_count": 1
2024-08-25 03:29:26 +09:00
},
{
"id": 846999955,
"name": "CVE-2024-38063-Research-Tool",
"full_name": "haroonawanofficial\/CVE-2024-38063-Research-Tool",
"owner": {
"login": "haroonawanofficial",
"id": 148648539,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148648539?v=4",
"html_url": "https:\/\/github.com\/haroonawanofficial"
},
"html_url": "https:\/\/github.com\/haroonawanofficial\/CVE-2024-38063-Research-Tool",
2024-08-31 03:29:44 +09:00
"description": "This is a functional proof of concept (PoC) for CVE-2024-38063. However, it's important to note that this CVE is theoretical and not exploitable in a real-world scenario. To enhance understanding for learners, I have developed a research tool that covers both past and newly reported TCP\/IP vulnerabilities in CVEs",
2024-08-25 03:29:26 +09:00
"fork": false,
"created_at": "2024-08-24T15:04:54Z",
2024-08-31 03:29:44 +09:00
"updated_at": "2024-08-30T16:31:48Z",
2024-08-26 15:29:24 +09:00
"pushed_at": "2024-08-26T06:18:08Z",
2024-08-28 21:29:42 +09:00
"stargazers_count": 2,
"watchers_count": 2,
2024-08-25 03:29:26 +09:00
"has_discussions": false,
2024-08-25 21:29:08 +09:00
"forks_count": 1,
2024-08-25 03:29:26 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-08-25 21:29:08 +09:00
"forks": 1,
2024-08-28 21:29:42 +09:00
"watchers": 2,
2024-08-25 03:29:26 +09:00
"score": 0,
2024-08-25 15:29:13 +09:00
"subscribers_count": 1
2024-08-25 09:29:15 +09:00
},
{
"id": 847061153,
"name": "CVE-2024-38063",
"full_name": "ynwarcs\/CVE-2024-38063",
"owner": {
"login": "ynwarcs",
"id": 108408574,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108408574?v=4",
"html_url": "https:\/\/github.com\/ynwarcs"
},
"html_url": "https:\/\/github.com\/ynwarcs\/CVE-2024-38063",
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
"fork": false,
"created_at": "2024-08-24T18:25:46Z",
2024-09-02 09:29:35 +09:00
"updated_at": "2024-09-01T20:35:16Z",
2024-08-27 21:30:07 +09:00
"pushed_at": "2024-08-27T12:22:39Z",
2024-09-02 09:29:35 +09:00
"stargazers_count": 481,
"watchers_count": 481,
2024-08-25 09:29:15 +09:00
"has_discussions": false,
2024-09-02 03:29:16 +09:00
"forks_count": 93,
2024-08-25 09:29:15 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-09-02 03:29:16 +09:00
"forks": 93,
2024-09-02 09:29:35 +09:00
"watchers": 481,
2024-08-25 09:29:15 +09:00
"score": 0,
2024-08-30 15:29:36 +09:00
"subscribers_count": 4
2024-08-28 03:29:36 +09:00
},
{
"id": 848337529,
"name": "CVE-2024-38063",
"full_name": "patchpoint\/CVE-2024-38063",
"owner": {
"login": "patchpoint",
"id": 174953042,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/174953042?v=4",
"html_url": "https:\/\/github.com\/patchpoint"
},
"html_url": "https:\/\/github.com\/patchpoint\/CVE-2024-38063",
"description": null,
"fork": false,
"created_at": "2024-08-27T15:21:25Z",
2024-08-31 03:29:44 +09:00
"updated_at": "2024-08-30T17:31:04Z",
2024-08-28 03:29:36 +09:00
"pushed_at": "2024-08-27T17:48:16Z",
2024-08-31 03:29:44 +09:00
"stargazers_count": 11,
"watchers_count": 11,
2024-08-28 15:29:31 +09:00
"has_discussions": false,
2024-08-30 15:29:36 +09:00
"forks_count": 2,
2024-08-28 15:29:31 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-08-30 15:29:36 +09:00
"forks": 2,
2024-08-31 03:29:44 +09:00
"watchers": 11,
2024-08-28 15:29:31 +09:00
"score": 0,
"subscribers_count": 2
},
{
"id": 848561863,
"name": "Windows-CVE-2024-38063",
"full_name": "PumpkinBridge\/Windows-CVE-2024-38063",
"owner": {
"login": "PumpkinBridge",
"id": 139355470,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/139355470?v=4",
"html_url": "https:\/\/github.com\/PumpkinBridge"
},
"html_url": "https:\/\/github.com\/PumpkinBridge\/Windows-CVE-2024-38063",
"description": "Windows TCP\/IP IPv6(CVE-2024-38063)",
"fork": false,
"created_at": "2024-08-28T01:46:44Z",
"updated_at": "2024-08-28T01:54:14Z",
"pushed_at": "2024-08-28T01:53:43Z",
"stargazers_count": 1,
"watchers_count": 1,
2024-08-28 03:29:36 +09:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
2024-08-28 15:29:31 +09:00
"watchers": 1,
2024-08-28 03:29:36 +09:00
"score": 0,
2024-08-29 15:29:25 +09:00
"subscribers_count": 1
2024-08-28 21:29:42 +09:00
},
{
"id": 848706606,
"name": "CVE-2024-38063-POC",
"full_name": "zenzue\/CVE-2024-38063-POC",
"owner": {
"login": "zenzue",
"id": 19271340,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19271340?v=4",
"html_url": "https:\/\/github.com\/zenzue"
},
"html_url": "https:\/\/github.com\/zenzue\/CVE-2024-38063-POC",
"description": "potential memory corruption vulnerabilities in IPv6 networks.",
"fork": false,
"created_at": "2024-08-28T08:57:23Z",
2024-09-01 03:29:13 +09:00
"updated_at": "2024-08-31T16:40:01Z",
2024-08-28 21:29:42 +09:00
"pushed_at": "2024-08-28T09:02:59Z",
2024-09-01 03:29:13 +09:00
"stargazers_count": 1,
"watchers_count": 1,
2024-08-28 21:29:42 +09:00
"has_discussions": false,
2024-09-01 03:29:13 +09:00
"forks_count": 3,
2024-08-28 21:29:42 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-09-01 03:29:13 +09:00
"forks": 3,
"watchers": 1,
2024-08-28 21:29:42 +09:00
"score": 0,
2024-08-29 15:29:25 +09:00
"subscribers_count": 1
2024-08-29 03:29:38 +09:00
},
{
"id": 848885997,
"name": "CVE-2024-38063-",
"full_name": "AdminPentester\/CVE-2024-38063-",
"owner": {
"login": "AdminPentester",
"id": 179179494,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179179494?v=4",
"html_url": "https:\/\/github.com\/AdminPentester"
},
"html_url": "https:\/\/github.com\/AdminPentester\/CVE-2024-38063-",
"description": "Remotely Exploiting The Kernel Via IPv6",
"fork": false,
"created_at": "2024-08-28T15:28:14Z",
2024-08-30 15:29:36 +09:00
"updated_at": "2024-08-30T01:27:19Z",
"pushed_at": "2024-08-30T01:27:16Z",
2024-08-29 15:29:25 +09:00
"stargazers_count": 1,
"watchers_count": 1,
2024-08-29 03:29:38 +09:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
2024-08-29 15:29:25 +09:00
"watchers": 1,
2024-08-29 03:29:38 +09:00
"score": 0,
2024-08-29 15:29:25 +09:00
"subscribers_count": 1
2024-09-01 03:29:13 +09:00
},
{
"id": 850339397,
"name": "CVE-2024-38063",
"full_name": "ThemeHackers\/CVE-2024-38063",
"owner": {
"login": "ThemeHackers",
"id": 107047730,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107047730?v=4",
"html_url": "https:\/\/github.com\/ThemeHackers"
},
"html_url": "https:\/\/github.com\/ThemeHackers\/CVE-2024-38063",
"description": "CVE-2024-38063 is a critical security vulnerability in the Windows TCP\/IP stack that allows for remote code execution (RCE)",
"fork": false,
"created_at": "2024-08-31T13:56:26Z",
2024-09-02 03:29:16 +09:00
"updated_at": "2024-09-01T15:28:15Z",
"pushed_at": "2024-09-01T15:28:12Z",
2024-09-01 03:29:13 +09:00
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2024-09-01 21:29:36 +09:00
"subscribers_count": 1
},
{
"id": 850609409,
"name": "CVE-2024-38063_PoC",
"full_name": "KernelKraze\/CVE-2024-38063_PoC",
"owner": {
"login": "KernelKraze",
"id": 82752974,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82752974?v=4",
"html_url": "https:\/\/github.com\/KernelKraze"
},
"html_url": "https:\/\/github.com\/KernelKraze\/CVE-2024-38063_PoC",
"description": "This is a C language program designed to test the Windows TCP\/IP Remote Code Execution Vulnerability (CVE-2024-38063). It sends specially crafted IPv6 packets with embedded shellcode to exploit the vulnerability.",
"fork": false,
"created_at": "2024-09-01T09:20:02Z",
"updated_at": "2024-09-01T09:24:03Z",
"pushed_at": "2024-09-01T09:24:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2024-09-01 03:29:13 +09:00
"subscribers_count": 0
2024-08-16 03:30:04 +09:00
}
]