272 lines
No EOL
9.8 KiB
JSON
272 lines
No EOL
9.8 KiB
JSON
[
|
|
{
|
|
"name": "CVE-2024-38063",
|
|
"full_name": "ynwarcs/CVE-2024-38063",
|
|
"html_url": "https://github.com/ynwarcs/CVE-2024-38063",
|
|
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
|
|
"stargazers_count": 655,
|
|
"forks_count": 119,
|
|
"created_at": "2024-08-24T18:25:46Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063-poc",
|
|
"full_name": "Sachinart/CVE-2024-38063-poc",
|
|
"html_url": "https://github.com/Sachinart/CVE-2024-38063-poc",
|
|
"description": "Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.",
|
|
"stargazers_count": 87,
|
|
"forks_count": 30,
|
|
"created_at": "2024-08-17T14:58:36Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063",
|
|
"full_name": "ThemeHackers/CVE-2024-38063",
|
|
"html_url": "https://github.com/ThemeHackers/CVE-2024-38063",
|
|
"description": "CVE-2024-38063 is a critical security vulnerability in the Windows TCP/IP stack that allows for remote code execution (RCE)",
|
|
"stargazers_count": 22,
|
|
"forks_count": 5,
|
|
"created_at": "2024-08-31T13:56:26Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063",
|
|
"full_name": "patchpoint/CVE-2024-38063",
|
|
"html_url": "https://github.com/patchpoint/CVE-2024-38063",
|
|
"description": null,
|
|
"stargazers_count": 20,
|
|
"forks_count": 3,
|
|
"created_at": "2024-08-27T15:21:25Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063",
|
|
"full_name": "diegoalbuquerque/CVE-2024-38063",
|
|
"html_url": "https://github.com/diegoalbuquerque/CVE-2024-38063",
|
|
"description": "mitigation script by disabling ipv6 of all interfaces",
|
|
"stargazers_count": 15,
|
|
"forks_count": 3,
|
|
"created_at": "2024-08-15T12:41:01Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-3806-AND-CVE-2024-3807-Poc",
|
|
"full_name": "truonghuuphuc/CVE-2024-3806-AND-CVE-2024-3807-Poc",
|
|
"html_url": "https://github.com/truonghuuphuc/CVE-2024-3806-AND-CVE-2024-3807-Poc",
|
|
"description": "CVE-2024-3806: Porto <= 7.1.0 - Unauthenticated Local File Inclusion via porto_ajax_posts CVE-2024-3807: Porto <= 7.1.0 - Authenticated (Contributor+) Local File Inclusion via Post Meta",
|
|
"stargazers_count": 8,
|
|
"forks_count": 0,
|
|
"created_at": "2024-05-10T16:13:07Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063-POC",
|
|
"full_name": "zenzue/CVE-2024-38063-POC",
|
|
"html_url": "https://github.com/zenzue/CVE-2024-38063-POC",
|
|
"description": "potential memory corruption vulnerabilities in IPv6 networks.",
|
|
"stargazers_count": 7,
|
|
"forks_count": 6,
|
|
"created_at": "2024-08-28T08:57:23Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063_PoC",
|
|
"full_name": "KernelKraze/CVE-2024-38063_PoC",
|
|
"html_url": "https://github.com/KernelKraze/CVE-2024-38063_PoC",
|
|
"description": "This is a C language program designed to test the Windows TCP/IP Remote Code Execution Vulnerability (CVE-2024-38063). It sends specially crafted IPv6 packets with embedded shellcode to exploit the vulnerability.",
|
|
"stargazers_count": 7,
|
|
"forks_count": 2,
|
|
"created_at": "2024-09-01T09:20:02Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063-Research-Tool",
|
|
"full_name": "haroonawanofficial/CVE-2024-38063-Research-Tool",
|
|
"html_url": "https://github.com/haroonawanofficial/CVE-2024-38063-Research-Tool",
|
|
"description": "This is a functional proof of concept (PoC) for CVE-2024-38063. However, it's important to note that this CVE is theoretical and not exploitable in a real-world scenario. To enhance understanding for learners, I have developed a research tool that covers both past and newly reported TCP/IP vulnerabilities in CVEs",
|
|
"stargazers_count": 5,
|
|
"forks_count": 1,
|
|
"created_at": "2024-08-24T15:04:54Z"
|
|
},
|
|
{
|
|
"name": "Windows-CVE-2024-38063",
|
|
"full_name": "PumpkinBridge/Windows-CVE-2024-38063",
|
|
"html_url": "https://github.com/PumpkinBridge/Windows-CVE-2024-38063",
|
|
"description": "Windows TCP/IP IPv6(CVE-2024-38063)",
|
|
"stargazers_count": 4,
|
|
"forks_count": 0,
|
|
"created_at": "2024-08-28T01:46:44Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063",
|
|
"full_name": "thanawee321/CVE-2024-38063",
|
|
"html_url": "https://github.com/thanawee321/CVE-2024-38063",
|
|
"description": "Vulnerability CVE-2024-38063",
|
|
"stargazers_count": 3,
|
|
"forks_count": 0,
|
|
"created_at": "2024-10-15T03:18:51Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063",
|
|
"full_name": "Th3Tr1ckst3r/CVE-2024-38063",
|
|
"html_url": "https://github.com/Th3Tr1ckst3r/CVE-2024-38063",
|
|
"description": "CVE-2024-38063 research so you don't have to.",
|
|
"stargazers_count": 2,
|
|
"forks_count": 0,
|
|
"created_at": "2024-08-23T06:28:03Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063-",
|
|
"full_name": "AdminPentester/CVE-2024-38063-",
|
|
"html_url": "https://github.com/AdminPentester/CVE-2024-38063-",
|
|
"description": "Remotely Exploiting The Kernel Via IPv6",
|
|
"stargazers_count": 2,
|
|
"forks_count": 1,
|
|
"created_at": "2024-08-28T15:28:14Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063",
|
|
"full_name": "becrevex/CVE-2024-38063",
|
|
"html_url": "https://github.com/becrevex/CVE-2024-38063",
|
|
"description": null,
|
|
"stargazers_count": 1,
|
|
"forks_count": 0,
|
|
"created_at": "2024-10-08T06:24:54Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063",
|
|
"full_name": "Dragkob/CVE-2024-38063",
|
|
"html_url": "https://github.com/Dragkob/CVE-2024-38063",
|
|
"description": "PoC for Windows' IPv6 CVE-2024-38063",
|
|
"stargazers_count": 1,
|
|
"forks_count": 0,
|
|
"created_at": "2024-11-16T17:22:08Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063",
|
|
"full_name": "Faizan-Khanx/CVE-2024-38063",
|
|
"html_url": "https://github.com/Faizan-Khanx/CVE-2024-38063",
|
|
"description": "CVE-2024-38063 - Remotely Exploiting The Kernel Via IPv6",
|
|
"stargazers_count": 1,
|
|
"forks_count": 0,
|
|
"created_at": "2024-09-10T07:15:20Z"
|
|
},
|
|
{
|
|
"name": "cve_2024_38063_research",
|
|
"full_name": "zaneoblaneo/cve_2024_38063_research",
|
|
"html_url": "https://github.com/zaneoblaneo/cve_2024_38063_research",
|
|
"description": "CVE 2024-38063 Research and POC development",
|
|
"stargazers_count": 1,
|
|
"forks_count": 0,
|
|
"created_at": "2024-08-22T03:51:43Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063-scanner",
|
|
"full_name": "jip-0-0-0-0-0/CVE-2024-38063-scanner",
|
|
"html_url": "https://github.com/jip-0-0-0-0-0/CVE-2024-38063-scanner",
|
|
"description": "A Python tool leveraging Shodan and Scapy to identify and exploit Windows systems vulnerable to CVE-2024-38063, enabling targeted Denial of Service attacks",
|
|
"stargazers_count": 1,
|
|
"forks_count": 0,
|
|
"created_at": "2025-01-16T10:31:43Z"
|
|
},
|
|
{
|
|
"name": "Cve-2024-38063",
|
|
"full_name": "brownpanda29/Cve-2024-38063",
|
|
"html_url": "https://github.com/brownpanda29/Cve-2024-38063",
|
|
"description": null,
|
|
"stargazers_count": 0,
|
|
"forks_count": 3,
|
|
"created_at": "2024-09-03T14:36:35Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-3806",
|
|
"full_name": "RandomRobbieBF/CVE-2024-3806",
|
|
"html_url": "https://github.com/RandomRobbieBF/CVE-2024-3806",
|
|
"description": "Porto <= 7.1.0 - Unauthenticated Local File Inclusion via porto_ajax_posts",
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2024-11-18T16:23:07Z"
|
|
},
|
|
{
|
|
"name": "cve-2024-38063",
|
|
"full_name": "ps-interactive/cve-2024-38063",
|
|
"html_url": "https://github.com/ps-interactive/cve-2024-38063",
|
|
"description": null,
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2024-09-02T14:16:31Z"
|
|
},
|
|
{
|
|
"name": "cve-2024-38063",
|
|
"full_name": "p33d/cve-2024-38063",
|
|
"html_url": "https://github.com/p33d/cve-2024-38063",
|
|
"description": "Poc for cve-2024-38063 ",
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2024-08-18T22:24:43Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063",
|
|
"full_name": "selenagomez25/CVE-2024-38063",
|
|
"html_url": "https://github.com/selenagomez25/CVE-2024-38063",
|
|
"description": "poc for exploiting cve-2024-38063",
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2024-11-18T15:20:24Z"
|
|
},
|
|
{
|
|
"name": "cve-2024-38063",
|
|
"full_name": "lnx-dvlpr/cve-2024-38063",
|
|
"html_url": "https://github.com/lnx-dvlpr/cve-2024-38063",
|
|
"description": null,
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2024-09-23T11:45:42Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063",
|
|
"full_name": "idkwastaken/CVE-2024-38063",
|
|
"html_url": "https://github.com/idkwastaken/CVE-2024-38063",
|
|
"description": null,
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2024-10-14T17:46:58Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063-Medium",
|
|
"full_name": "ArenaldyP/CVE-2024-38063-Medium",
|
|
"html_url": "https://github.com/ArenaldyP/CVE-2024-38063-Medium",
|
|
"description": "Kode Eksploitasi CVE-2024-38063",
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2024-09-21T17:33:52Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063-Remediation",
|
|
"full_name": "dweger-scripts/CVE-2024-38063-Remediation",
|
|
"html_url": "https://github.com/dweger-scripts/CVE-2024-38063-Remediation",
|
|
"description": null,
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2024-08-19T19:44:37Z"
|
|
},
|
|
{
|
|
"name": "Windows-CVE-2024-38063",
|
|
"full_name": "Laukage/Windows-CVE-2024-38063",
|
|
"html_url": "https://github.com/Laukage/Windows-CVE-2024-38063",
|
|
"description": null,
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2024-12-06T21:45:09Z"
|
|
},
|
|
{
|
|
"name": "cve-2024-38063-Anonyvader",
|
|
"full_name": "AliHj98/cve-2024-38063-Anonyvader",
|
|
"html_url": "https://github.com/AliHj98/cve-2024-38063-Anonyvader",
|
|
"description": null,
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2024-11-07T09:36:32Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063-VB",
|
|
"full_name": "noradlb1/CVE-2024-38063-VB",
|
|
"html_url": "https://github.com/noradlb1/CVE-2024-38063-VB",
|
|
"description": "CVE-2024-38063 VB",
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2024-08-17T01:11:12Z"
|
|
}
|
|
] |