目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2024-38063 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
Windows TCP/IP Remote Code Execution Vulnerability
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
Windows TCP/IP Remote Code Execution Vulnerability
来源: 美国国家漏洞数据库 NVD
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
整数下溢(超界折返)
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Microsoft Windows TCP/IP component 数字错误漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Microsoft Windows tcp/ip是美国微软(Microsoft)公司的一个 Windows 的 Tcp/Ip 支持服务。 Microsoft Windows TCP/IP component存在数字错误漏洞。攻击者利用该漏洞可以远程执行代码。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 1809 f
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
MicrosoftWindows 10 Version 1809 10.0.17763.0 ~ 10.0.17763.6293 -
MicrosoftWindows Server 2019 10.0.17763.0 ~ 10.0.17763.6293 -
MicrosoftWindows Server 2019 (Server Core installation) 10.0.17763.0 ~ 10.0.17763.6293 -
MicrosoftWindows Server 2022 10.0.20348.0 ~ 10.0.20348.2700 -
MicrosoftWindows 11 version 21H2 10.0.0 ~ 10.0.22000.3197 -
MicrosoftWindows 10 Version 21H2 10.0.19043.0 ~ 10.0.19044.4780 -
MicrosoftWindows 11 version 22H2 10.0.22621.0 ~ 10.0.22621.4037 -
MicrosoftWindows 10 Version 22H2 10.0.19045.0 ~ 10.0.19045.4780 -
MicrosoftWindows 11 version 22H3 10.0.22631.0 ~ 10.0.22631.4037 -
MicrosoftWindows 11 Version 23H2 10.0.22631.0 ~ 10.0.22631.4037 -
MicrosoftWindows Server 2022, 23H2 Edition (Server Core installation) 10.0.25398.0 ~ 10.0.25398.1085 -
MicrosoftWindows 10 Version 1507 10.0.10240.0 ~ 10.0.10240.20751 -
MicrosoftWindows 10 Version 1607 10.0.14393.0 ~ 10.0.14393.7259 -
MicrosoftWindows Server 2016 10.0.14393.0 ~ 10.0.14393.7259 -
MicrosoftWindows Server 2016 (Server Core installation) 10.0.14393.0 ~ 10.0.14393.7259 -
MicrosoftWindows Server 2008 Service Pack 2 6.0.6003.0 ~ 6.0.6003.22825 -
MicrosoftWindows Server 2008 Service Pack 2 (Server Core installation) 6.0.6003.0 ~ 6.0.6003.22825 -
MicrosoftWindows Server 2008 Service Pack 2 6.0.6003.0 ~ 6.0.6003.22825 -
MicrosoftWindows Server 2008 R2 Service Pack 1 6.1.7601.0 ~ 6.1.7601.27277 -
MicrosoftWindows Server 2008 R2 Service Pack 1 (Server Core installation) 6.1.7601.0 ~ 6.1.7601.27277 -
MicrosoftWindows Server 2012 6.2.9200.0 ~ 6.2.9200.25031 -
MicrosoftWindows Server 2012 (Server Core installation) 6.2.9200.0 ~ 6.2.9200.25031 -
MicrosoftWindows Server 2012 R2 6.3.9600.0 ~ 6.3.9600.22134 -
MicrosoftWindows Server 2012 R2 (Server Core installation) 6.3.9600.0 ~ 6.3.9600.22134 -
MicrosoftWindows 11 Version 24H2 10.0.26100.0 ~ 10.0.26100.1457 -
二、漏洞 CVE-2024-38063 的公开POC
#POC 描述源链接神龙链接
1mitigation script by disabling ipv6 of all interfaceshttps://github.com/diegoalbuquerque/CVE-2024-38063POC详情
2CVE-2024-38063 exploits for salehttps://github.com/proxykingdev/CVE-2024-38063POC详情
3CVE-2024-38063 VBhttps://github.com/noradlb1/CVE-2024-38063-VBPOC详情
4CVE-2024-38063 PoC. CVE-2024-38063 Demohttps://github.com/hanks445/CVE-2024-38063POC详情
5Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.https://github.com/Sachinart/CVE-2024-38063-POCPOC详情
6Poc for cve-2024-38063 https://github.com/p33d/cve-2024-38063POC详情
7Nonehttps://github.com/dweger-scripts/CVE-2024-38063-RemediationPOC详情
8A PowerShell script to temporarily mitigate the CVE-2024-38063 vulnerability by disabling IPv6 on Windows systems. This workaround modifies the registry to reduce the risk of exploitation without needing the immediate installation of the official Microsoft KB update. Intended as a temporary fixhttps://github.com/almogopp/Disable-IPv6-CVE-2024-38063-FixPOC详情
9CVE-2024-38063 research so you don't have to.https://github.com/Th3Tr1ckst3r/CVE-2024-38063POC详情
10Looks like this exploit is theoretical rather practicalhttps://github.com/haroonawanofficial/CVE-2024-38063-Research-ToolPOC详情
11poc for CVE-2024-38063 (RCE in tcpip.sys)https://github.com/ynwarcs/CVE-2024-38063POC详情
12Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.https://github.com/Sachinart/CVE-2024-38063-simulationPOC详情
13Nonehttps://github.com/patchpoint/CVE-2024-38063POC详情
14Windows TCP/IP IPv6(CVE-2024-38063)https://github.com/PumpkinBridge/Windows-CVE-2024-38063POC详情
15potential memory corruption vulnerabilities in IPv6 networks.https://github.com/zenzue/CVE-2024-38063-POCPOC详情
16Remotely Exploiting The Kernel Via IPv6https://github.com/AdminPentester/CVE-2024-38063-POC详情
17Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.https://github.com/Sachinart/CVE-2024-38063-pocPOC详情
18CVE-2024-38063 is a critical security vulnerability in the Windows TCP/IP stack that allows for remote code execution (RCE)https://github.com/ThemeHackers/CVE-2024-38063POC详情
19This is a C language program designed to test the Windows TCP/IP Remote Code Execution Vulnerability (CVE-2024-38063). It sends specially crafted IPv6 packets with embedded shellcode to exploit the vulnerability.https://github.com/KernelKraze/CVE-2024-38063_PoCPOC详情
20An educational IPv6 exploitation tool which demonstrates advanced networking techniques being used in the wild with CVE-2024-38063.https://github.com/Th3Tr1ckst3r/Denyv6POC详情
21Nonehttps://github.com/ps-interactive/cve-2024-38063POC详情
22Nonehttps://github.com/Brownpanda29/Cve-2024-38063POC详情
23quick powershell script to fix cve-2024-38063https://github.com/FrancescoDiSalesGithub/quick-fix-cve-2024-38063POC详情
24CVE-2024-38063 - Remotely Exploiting The Kernel Via IPv6https://github.com/Faizan-Khanx/CVE-2024-38063POC详情
25Kode Eksploitasi CVE-2024-38063https://github.com/ArenaldyP/CVE-2024-38063-MediumPOC详情
26Nonehttps://github.com/lnx-dvlpr/cve-2024-38063POC详情
27Nonehttps://github.com/becrevex/CVE-2024-38063POC详情
28Nonehttps://github.com/idkwastaken/CVE-2024-38063POC详情
29Vulnerability CVE-2024-38063https://github.com/thanawee321/CVE-2024-38063POC详情
30Nonehttps://github.com/AliHj98/cve-2024-38063-AnonyvaderPOC详情
31PoC for Windows' IPv6 CVE-2024-38063https://github.com/Dragkob/CVE-2024-38063POC详情
32poc for exploiting cve-2024-38063https://github.com/selenagomez25/CVE-2024-38063POC详情
33Nonehttps://github.com/Laukage/Windows-CVE-2024-38063POC详情
34Nonehttps://github.com/jamesbishop785/CVE-2024-38063POC详情
35Nonehttps://github.com/brownpanda29/Cve-2024-38063POC详情
36A Python tool leveraging Shodan and Scapy to identify and exploit Windows systems vulnerable to CVE-2024-38063, enabling targeted Denial of Service attackshttps://github.com/jip-0-0-0-0-0/CVE-2024-38063-scannerPOC详情
37Nonehttps://github.com/fredagsguf/Windows-CVE-2024-38063POC详情
38AI-Powered CVE-2024-38063 0-Day Discovery Fuzzerhttps://github.com/haroonawanofficial/AI-CVE-2024-38063-0-DAYPOC详情
39Nonehttps://github.com/Skac44/CVE-2024-38063POC详情
40Monthly Land Temperature Surface Base Nano-Castle help learn the basics of Javahttps://github.com/akozsentre/CVE-2024-38063POC详情
41SSP H3https://github.com/thealice01/CVE-2024-38063POC详情
42Final Project in Fundamental network security,POC CVE-202438063https://github.com/Avidan1/CVE-2024-38063POC详情
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2024-38063 的情报信息
Please 登录 to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2024-38063

暂无评论


发表评论