github_poc_collector/exploits/2024/CVE-2024-3806.json

272 lines
No EOL
9.8 KiB
JSON

[
{
"name": "CVE-2024-38063",
"full_name": "ynwarcs/CVE-2024-38063",
"html_url": "https://github.com/ynwarcs/CVE-2024-38063",
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
"stargazers_count": 655,
"forks_count": 119,
"created_at": "2024-08-24T18:25:46Z"
},
{
"name": "CVE-2024-38063-poc",
"full_name": "Sachinart/CVE-2024-38063-poc",
"html_url": "https://github.com/Sachinart/CVE-2024-38063-poc",
"description": "Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.",
"stargazers_count": 87,
"forks_count": 30,
"created_at": "2024-08-17T14:58:36Z"
},
{
"name": "CVE-2024-38063",
"full_name": "ThemeHackers/CVE-2024-38063",
"html_url": "https://github.com/ThemeHackers/CVE-2024-38063",
"description": "CVE-2024-38063 is a critical security vulnerability in the Windows TCP/IP stack that allows for remote code execution (RCE)",
"stargazers_count": 22,
"forks_count": 5,
"created_at": "2024-08-31T13:56:26Z"
},
{
"name": "CVE-2024-38063",
"full_name": "patchpoint/CVE-2024-38063",
"html_url": "https://github.com/patchpoint/CVE-2024-38063",
"description": null,
"stargazers_count": 20,
"forks_count": 3,
"created_at": "2024-08-27T15:21:25Z"
},
{
"name": "CVE-2024-38063",
"full_name": "diegoalbuquerque/CVE-2024-38063",
"html_url": "https://github.com/diegoalbuquerque/CVE-2024-38063",
"description": "mitigation script by disabling ipv6 of all interfaces",
"stargazers_count": 15,
"forks_count": 3,
"created_at": "2024-08-15T12:41:01Z"
},
{
"name": "CVE-2024-3806-AND-CVE-2024-3807-Poc",
"full_name": "truonghuuphuc/CVE-2024-3806-AND-CVE-2024-3807-Poc",
"html_url": "https://github.com/truonghuuphuc/CVE-2024-3806-AND-CVE-2024-3807-Poc",
"description": "CVE-2024-3806: Porto <= 7.1.0 - Unauthenticated Local File Inclusion via porto_ajax_posts CVE-2024-3807: Porto <= 7.1.0 - Authenticated (Contributor+) Local File Inclusion via Post Meta",
"stargazers_count": 8,
"forks_count": 0,
"created_at": "2024-05-10T16:13:07Z"
},
{
"name": "CVE-2024-38063-POC",
"full_name": "zenzue/CVE-2024-38063-POC",
"html_url": "https://github.com/zenzue/CVE-2024-38063-POC",
"description": "potential memory corruption vulnerabilities in IPv6 networks.",
"stargazers_count": 7,
"forks_count": 6,
"created_at": "2024-08-28T08:57:23Z"
},
{
"name": "CVE-2024-38063_PoC",
"full_name": "KernelKraze/CVE-2024-38063_PoC",
"html_url": "https://github.com/KernelKraze/CVE-2024-38063_PoC",
"description": "This is a C language program designed to test the Windows TCP/IP Remote Code Execution Vulnerability (CVE-2024-38063). It sends specially crafted IPv6 packets with embedded shellcode to exploit the vulnerability.",
"stargazers_count": 7,
"forks_count": 2,
"created_at": "2024-09-01T09:20:02Z"
},
{
"name": "CVE-2024-38063-Research-Tool",
"full_name": "haroonawanofficial/CVE-2024-38063-Research-Tool",
"html_url": "https://github.com/haroonawanofficial/CVE-2024-38063-Research-Tool",
"description": "This is a functional proof of concept (PoC) for CVE-2024-38063. However, it's important to note that this CVE is theoretical and not exploitable in a real-world scenario. To enhance understanding for learners, I have developed a research tool that covers both past and newly reported TCP/IP vulnerabilities in CVEs",
"stargazers_count": 5,
"forks_count": 1,
"created_at": "2024-08-24T15:04:54Z"
},
{
"name": "Windows-CVE-2024-38063",
"full_name": "PumpkinBridge/Windows-CVE-2024-38063",
"html_url": "https://github.com/PumpkinBridge/Windows-CVE-2024-38063",
"description": "Windows TCP/IP IPv6(CVE-2024-38063)",
"stargazers_count": 4,
"forks_count": 0,
"created_at": "2024-08-28T01:46:44Z"
},
{
"name": "CVE-2024-38063",
"full_name": "thanawee321/CVE-2024-38063",
"html_url": "https://github.com/thanawee321/CVE-2024-38063",
"description": "Vulnerability CVE-2024-38063",
"stargazers_count": 3,
"forks_count": 0,
"created_at": "2024-10-15T03:18:51Z"
},
{
"name": "CVE-2024-38063",
"full_name": "Th3Tr1ckst3r/CVE-2024-38063",
"html_url": "https://github.com/Th3Tr1ckst3r/CVE-2024-38063",
"description": "CVE-2024-38063 research so you don't have to.",
"stargazers_count": 2,
"forks_count": 0,
"created_at": "2024-08-23T06:28:03Z"
},
{
"name": "CVE-2024-38063-",
"full_name": "AdminPentester/CVE-2024-38063-",
"html_url": "https://github.com/AdminPentester/CVE-2024-38063-",
"description": "Remotely Exploiting The Kernel Via IPv6",
"stargazers_count": 2,
"forks_count": 1,
"created_at": "2024-08-28T15:28:14Z"
},
{
"name": "CVE-2024-38063",
"full_name": "becrevex/CVE-2024-38063",
"html_url": "https://github.com/becrevex/CVE-2024-38063",
"description": null,
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2024-10-08T06:24:54Z"
},
{
"name": "CVE-2024-38063",
"full_name": "Dragkob/CVE-2024-38063",
"html_url": "https://github.com/Dragkob/CVE-2024-38063",
"description": "PoC for Windows' IPv6 CVE-2024-38063",
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2024-11-16T17:22:08Z"
},
{
"name": "CVE-2024-38063",
"full_name": "Faizan-Khanx/CVE-2024-38063",
"html_url": "https://github.com/Faizan-Khanx/CVE-2024-38063",
"description": "CVE-2024-38063 - Remotely Exploiting The Kernel Via IPv6",
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2024-09-10T07:15:20Z"
},
{
"name": "cve_2024_38063_research",
"full_name": "zaneoblaneo/cve_2024_38063_research",
"html_url": "https://github.com/zaneoblaneo/cve_2024_38063_research",
"description": "CVE 2024-38063 Research and POC development",
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2024-08-22T03:51:43Z"
},
{
"name": "CVE-2024-38063-scanner",
"full_name": "jip-0-0-0-0-0/CVE-2024-38063-scanner",
"html_url": "https://github.com/jip-0-0-0-0-0/CVE-2024-38063-scanner",
"description": "A Python tool leveraging Shodan and Scapy to identify and exploit Windows systems vulnerable to CVE-2024-38063, enabling targeted Denial of Service attacks",
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2025-01-16T10:31:43Z"
},
{
"name": "Cve-2024-38063",
"full_name": "brownpanda29/Cve-2024-38063",
"html_url": "https://github.com/brownpanda29/Cve-2024-38063",
"description": null,
"stargazers_count": 0,
"forks_count": 3,
"created_at": "2024-09-03T14:36:35Z"
},
{
"name": "CVE-2024-3806",
"full_name": "RandomRobbieBF/CVE-2024-3806",
"html_url": "https://github.com/RandomRobbieBF/CVE-2024-3806",
"description": "Porto <= 7.1.0 - Unauthenticated Local File Inclusion via porto_ajax_posts",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2024-11-18T16:23:07Z"
},
{
"name": "cve-2024-38063",
"full_name": "ps-interactive/cve-2024-38063",
"html_url": "https://github.com/ps-interactive/cve-2024-38063",
"description": null,
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2024-09-02T14:16:31Z"
},
{
"name": "cve-2024-38063",
"full_name": "p33d/cve-2024-38063",
"html_url": "https://github.com/p33d/cve-2024-38063",
"description": "Poc for cve-2024-38063 ",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2024-08-18T22:24:43Z"
},
{
"name": "CVE-2024-38063",
"full_name": "selenagomez25/CVE-2024-38063",
"html_url": "https://github.com/selenagomez25/CVE-2024-38063",
"description": "poc for exploiting cve-2024-38063",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2024-11-18T15:20:24Z"
},
{
"name": "cve-2024-38063",
"full_name": "lnx-dvlpr/cve-2024-38063",
"html_url": "https://github.com/lnx-dvlpr/cve-2024-38063",
"description": null,
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2024-09-23T11:45:42Z"
},
{
"name": "CVE-2024-38063",
"full_name": "idkwastaken/CVE-2024-38063",
"html_url": "https://github.com/idkwastaken/CVE-2024-38063",
"description": null,
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2024-10-14T17:46:58Z"
},
{
"name": "CVE-2024-38063-Medium",
"full_name": "ArenaldyP/CVE-2024-38063-Medium",
"html_url": "https://github.com/ArenaldyP/CVE-2024-38063-Medium",
"description": "Kode Eksploitasi CVE-2024-38063",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2024-09-21T17:33:52Z"
},
{
"name": "CVE-2024-38063-Remediation",
"full_name": "dweger-scripts/CVE-2024-38063-Remediation",
"html_url": "https://github.com/dweger-scripts/CVE-2024-38063-Remediation",
"description": null,
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2024-08-19T19:44:37Z"
},
{
"name": "Windows-CVE-2024-38063",
"full_name": "Laukage/Windows-CVE-2024-38063",
"html_url": "https://github.com/Laukage/Windows-CVE-2024-38063",
"description": null,
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2024-12-06T21:45:09Z"
},
{
"name": "cve-2024-38063-Anonyvader",
"full_name": "AliHj98/cve-2024-38063-Anonyvader",
"html_url": "https://github.com/AliHj98/cve-2024-38063-Anonyvader",
"description": null,
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2024-11-07T09:36:32Z"
},
{
"name": "CVE-2024-38063-VB",
"full_name": "noradlb1/CVE-2024-38063-VB",
"html_url": "https://github.com/noradlb1/CVE-2024-38063-VB",
"description": "CVE-2024-38063 VB",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2024-08-17T01:11:12Z"
}
]