[ { "id": 842939338, "name": "CVE-2024-38063", "full_name": "diegoalbuquerque\/CVE-2024-38063", "owner": { "login": "diegoalbuquerque", "id": 160813, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/160813?v=4", "html_url": "https:\/\/github.com\/diegoalbuquerque", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/diegoalbuquerque\/CVE-2024-38063", "description": "mitigation script by disabling ipv6 of all interfaces", "fork": false, "created_at": "2024-08-15T12:41:01Z", "updated_at": "2024-08-27T10:04:08Z", "pushed_at": "2024-08-15T13:53:45Z", "stargazers_count": 15, "watchers_count": 15, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 15, "score": 0, "subscribers_count": 1 }, { "id": 843636100, "name": "CVE-2024-38063-VB", "full_name": "noradlb1\/CVE-2024-38063-VB", "owner": { "login": "noradlb1", "id": 74623428, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74623428?v=4", "html_url": "https:\/\/github.com\/noradlb1", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/noradlb1\/CVE-2024-38063-VB", "description": "CVE-2024-38063 VB", "fork": false, "created_at": "2024-08-17T01:11:12Z", "updated_at": "2024-08-17T01:20:05Z", "pushed_at": "2024-08-17T01:20:02Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 843832661, "name": "CVE-2024-38063-poc", "full_name": "Sachinart\/CVE-2024-38063-poc", "owner": { "login": "Sachinart", "id": 18497191, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18497191?v=4", "html_url": "https:\/\/github.com\/Sachinart", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Sachinart\/CVE-2024-38063-poc", "description": "Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.", "fork": false, "created_at": "2024-08-17T14:58:36Z", "updated_at": "2024-11-28T16:04:55Z", "pushed_at": "2024-08-28T20:56:40Z", "stargazers_count": 83, "watchers_count": 83, "has_discussions": false, "forks_count": 30, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 30, "watchers": 83, "score": 0, "subscribers_count": 4 }, { "id": 844272199, "name": "cve-2024-38063", "full_name": "p33d\/cve-2024-38063", "owner": { "login": "p33d", "id": 123099747, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123099747?v=4", "html_url": "https:\/\/github.com\/p33d", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/p33d\/cve-2024-38063", "description": "Poc for cve-2024-38063 ", "fork": false, "created_at": "2024-08-18T22:24:43Z", "updated_at": "2024-08-18T22:24:43Z", "pushed_at": "2024-08-18T22:24:43Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 844698787, "name": "CVE-2024-38063-Remediation", "full_name": "dweger-scripts\/CVE-2024-38063-Remediation", "owner": { "login": "dweger-scripts", "id": 174140925, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/174140925?v=4", "html_url": "https:\/\/github.com\/dweger-scripts", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/dweger-scripts\/CVE-2024-38063-Remediation", "description": null, "fork": false, "created_at": "2024-08-19T19:44:37Z", "updated_at": "2024-08-21T14:58:51Z", "pushed_at": "2024-08-21T14:58:48Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 844930990, "name": "Disable-IPv6-CVE-2024-38063-Fix", "full_name": "almogopp\/Disable-IPv6-CVE-2024-38063-Fix", "owner": { "login": "almogopp", "id": 37026702, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37026702?v=4", "html_url": "https:\/\/github.com\/almogopp", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/almogopp\/Disable-IPv6-CVE-2024-38063-Fix", "description": "A PowerShell script to temporarily mitigate the CVE-2024-38063 vulnerability by disabling IPv6 on Windows systems. This workaround modifies the registry to reduce the risk of exploitation without needing the immediate installation of the official Microsoft KB update. Intended as a temporary fix", "fork": false, "created_at": "2024-08-20T08:48:08Z", "updated_at": "2024-08-20T08:50:31Z", "pushed_at": "2024-08-20T08:50:28Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 846408465, "name": "CVE-2024-38063", "full_name": "Th3Tr1ckst3r\/CVE-2024-38063", "owner": { "login": "Th3Tr1ckst3r", "id": 21149460, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21149460?v=4", "html_url": "https:\/\/github.com\/Th3Tr1ckst3r", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Th3Tr1ckst3r\/CVE-2024-38063", "description": "CVE-2024-38063 research so you don't have to.", "fork": false, "created_at": "2024-08-23T06:28:03Z", "updated_at": "2024-08-31T00:54:01Z", "pushed_at": "2024-08-30T22:18:44Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": true, "topics": [ "cve-2024-38063", "cve-2024-38063-poc" ], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 846999955, "name": "CVE-2024-38063-Research-Tool", "full_name": "haroonawanofficial\/CVE-2024-38063-Research-Tool", "owner": { "login": "haroonawanofficial", "id": 148648539, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148648539?v=4", "html_url": "https:\/\/github.com\/haroonawanofficial", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/haroonawanofficial\/CVE-2024-38063-Research-Tool", "description": "This is a functional proof of concept (PoC) for CVE-2024-38063. However, it's important to note that this CVE is theoretical and not exploitable in a real-world scenario. To enhance understanding for learners, I have developed a research tool that covers both past and newly reported TCP\/IP vulnerabilities in CVEs", "fork": false, "created_at": "2024-08-24T15:04:54Z", "updated_at": "2024-11-19T05:55:14Z", "pushed_at": "2024-08-26T06:18:08Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 5, "score": 0, "subscribers_count": 1 }, { "id": 847061153, "name": "CVE-2024-38063", "full_name": "ynwarcs\/CVE-2024-38063", "owner": { "login": "ynwarcs", "id": 108408574, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108408574?v=4", "html_url": "https:\/\/github.com\/ynwarcs", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ynwarcs\/CVE-2024-38063", "description": "poc for CVE-2024-38063 (RCE in tcpip.sys)", "fork": false, "created_at": "2024-08-24T18:25:46Z", "updated_at": "2025-01-12T06:04:12Z", "pushed_at": "2024-08-27T12:22:39Z", "stargazers_count": 642, "watchers_count": 642, "has_discussions": false, "forks_count": 116, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 116, "watchers": 642, "score": 0, "subscribers_count": 5 }, { "id": 848337529, "name": "CVE-2024-38063", "full_name": "patchpoint\/CVE-2024-38063", "owner": { "login": "patchpoint", "id": 174953042, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/174953042?v=4", "html_url": "https:\/\/github.com\/patchpoint", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/patchpoint\/CVE-2024-38063", "description": null, "fork": false, "created_at": "2024-08-27T15:21:25Z", "updated_at": "2025-01-12T03:44:43Z", "pushed_at": "2024-08-27T17:48:16Z", "stargazers_count": 20, "watchers_count": 20, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 20, "score": 0, "subscribers_count": 2 }, { "id": 848561863, "name": "Windows-CVE-2024-38063", "full_name": "PumpkinBridge\/Windows-CVE-2024-38063", "owner": { "login": "PumpkinBridge", "id": 139355470, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/139355470?v=4", "html_url": "https:\/\/github.com\/PumpkinBridge", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/PumpkinBridge\/Windows-CVE-2024-38063", "description": "Windows TCP\/IP IPv6(CVE-2024-38063)", "fork": false, "created_at": "2024-08-28T01:46:44Z", "updated_at": "2024-09-29T15:19:37Z", "pushed_at": "2024-08-28T01:53:43Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 4, "score": 0, "subscribers_count": 1 }, { "id": 848706606, "name": "CVE-2024-38063-POC", "full_name": "zenzue\/CVE-2024-38063-POC", "owner": { "login": "zenzue", "id": 19271340, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19271340?v=4", "html_url": "https:\/\/github.com\/zenzue", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/zenzue\/CVE-2024-38063-POC", "description": "potential memory corruption vulnerabilities in IPv6 networks.", "fork": false, "created_at": "2024-08-28T08:57:23Z", "updated_at": "2024-11-05T16:15:14Z", "pushed_at": "2024-08-28T09:02:59Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 6, "watchers": 7, "score": 0, "subscribers_count": 1 }, { "id": 848885997, "name": "CVE-2024-38063-", "full_name": "AdminPentester\/CVE-2024-38063-", "owner": { "login": "AdminPentester", "id": 179179494, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179179494?v=4", "html_url": "https:\/\/github.com\/AdminPentester", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/AdminPentester\/CVE-2024-38063-", "description": "Remotely Exploiting The Kernel Via IPv6", "fork": false, "created_at": "2024-08-28T15:28:14Z", "updated_at": "2024-12-27T06:00:11Z", "pushed_at": "2024-08-30T01:27:16Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 850339397, "name": "CVE-2024-38063", "full_name": "ThemeHackers\/CVE-2024-38063", "owner": { "login": "ThemeHackers", "id": 107047730, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107047730?v=4", "html_url": "https:\/\/github.com\/ThemeHackers", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ThemeHackers\/CVE-2024-38063", "description": "CVE-2024-38063 is a critical security vulnerability in the Windows TCP\/IP stack that allows for remote code execution (RCE)", "fork": false, "created_at": "2024-08-31T13:56:26Z", "updated_at": "2024-12-15T05:49:42Z", "pushed_at": "2024-12-15T05:49:39Z", "stargazers_count": 17, "watchers_count": 17, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 17, "score": 0, "subscribers_count": 1 }, { "id": 850609409, "name": "CVE-2024-38063_PoC", "full_name": "KernelKraze\/CVE-2024-38063_PoC", "owner": { "login": "KernelKraze", "id": 82752974, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82752974?v=4", "html_url": "https:\/\/github.com\/KernelKraze", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/KernelKraze\/CVE-2024-38063_PoC", "description": "This is a C language program designed to test the Windows TCP\/IP Remote Code Execution Vulnerability (CVE-2024-38063). It sends specially crafted IPv6 packets with embedded shellcode to exploit the vulnerability.", "fork": false, "created_at": "2024-09-01T09:20:02Z", "updated_at": "2025-01-14T05:25:38Z", "pushed_at": "2024-09-08T07:12:26Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 7, "score": 0, "subscribers_count": 1 }, { "id": 851150728, "name": "cve-2024-38063", "full_name": "ps-interactive\/cve-2024-38063", "owner": { "login": "ps-interactive", "id": 35313392, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35313392?v=4", "html_url": "https:\/\/github.com\/ps-interactive", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ps-interactive\/cve-2024-38063", "description": null, "fork": false, "created_at": "2024-09-02T14:16:31Z", "updated_at": "2024-09-02T14:16:55Z", "pushed_at": "2024-09-02T14:16:52Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 4 }, { "id": 851683675, "name": "Cve-2024-38063", "full_name": "brownpanda29\/Cve-2024-38063", "owner": { "login": "brownpanda29", "id": 147920175, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/147920175?v=4", "html_url": "https:\/\/github.com\/brownpanda29", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/brownpanda29\/Cve-2024-38063", "description": null, "fork": false, "created_at": "2024-09-03T14:36:35Z", "updated_at": "2024-09-03T14:59:43Z", "pushed_at": "2024-09-03T14:59:39Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 853823211, "name": "quick-fix-cve-2024-38063", "full_name": "FrancescoDiSalesGithub\/quick-fix-cve-2024-38063", "owner": { "login": "FrancescoDiSalesGithub", "id": 17337009, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17337009?v=4", "html_url": "https:\/\/github.com\/FrancescoDiSalesGithub", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/FrancescoDiSalesGithub\/quick-fix-cve-2024-38063", "description": "quick powershell script to fix cve-2024-38063", "fork": false, "created_at": "2024-09-07T16:27:27Z", "updated_at": "2024-09-08T08:59:32Z", "pushed_at": "2024-09-08T08:59:29Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "blueteam", "cve-2024-38063", "fix", "powershell", "script", "workaround" ], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 855027111, "name": "CVE-2024-38063", "full_name": "Faizan-Khanx\/CVE-2024-38063", "owner": { "login": "Faizan-Khanx", "id": 156709479, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/156709479?v=4", "html_url": "https:\/\/github.com\/Faizan-Khanx", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Faizan-Khanx\/CVE-2024-38063", "description": "CVE-2024-38063 - Remotely Exploiting The Kernel Via IPv6", "fork": false, "created_at": "2024-09-10T07:15:20Z", "updated_at": "2024-09-10T12:34:53Z", "pushed_at": "2024-09-10T10:19:14Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 860985934, "name": "CVE-2024-38063-Medium", "full_name": "ArenaldyP\/CVE-2024-38063-Medium", "owner": { "login": "ArenaldyP", "id": 134998695, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/134998695?v=4", "html_url": "https:\/\/github.com\/ArenaldyP", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ArenaldyP\/CVE-2024-38063-Medium", "description": "Kode Eksploitasi CVE-2024-38063", "fork": false, "created_at": "2024-09-21T17:33:52Z", "updated_at": "2024-09-22T16:03:48Z", "pushed_at": "2024-09-22T16:03:45Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 861711766, "name": "cve-2024-38063", "full_name": "lnx-dvlpr\/cve-2024-38063", "owner": { "login": "lnx-dvlpr", "id": 169969340, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/169969340?v=4", "html_url": "https:\/\/github.com\/lnx-dvlpr", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/lnx-dvlpr\/cve-2024-38063", "description": null, "fork": false, "created_at": "2024-09-23T11:45:42Z", "updated_at": "2024-09-25T12:01:17Z", "pushed_at": "2024-09-25T12:01:14Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 } ]