{"vulnerability": "CVE-2024-38063", "sightings": [{"uuid": "1a2ce8bd-d87c-4c73-bcd1-5f89ee6b4b64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "cve-2024-38063", "type": "seen", "source": null, "content": "", "creation_timestamp": "2024-10-18T12:29:33.719171Z"}, {"uuid": "496e1464-e5db-4591-aba1-a8cee68b8a51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "https://www.thezdi.com/blog/2024/8/13/the-august-2024-security-update-review", "content": "", "creation_timestamp": "2024-08-13T18:05:01.000000Z"}, {"uuid": "c4ac55fd-d7ea-44d3-86ca-d5936187590d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "https://bsky.app/profile/pvynckier.bsky.social/post/3legsx6n6rs2r", "content": "", "creation_timestamp": "2024-12-29T10:33:34.506838Z"}, {"uuid": "6145d346-216f-44ed-84bd-dd279fa8ed85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "https://bsky.app/profile/schnoog.eu/post/3lk5xipssos2a", "content": "", "creation_timestamp": "2025-03-12T06:32:10.064354Z"}, {"uuid": "008a1cf5-7e40-4ed5-ae34-4fd11569c026", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "https://bsky.app/profile/ytroncal.bsky.social/post/3lqgdamoshk2f", "content": "", "creation_timestamp": "2025-05-30T22:54:58.764779Z"}, {"uuid": "26da1b59-526d-4dd8-8083-232bf42a536d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-38063", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lj7unwwj622y", "content": "", "creation_timestamp": "2025-02-28T07:21:31.984392Z"}, {"uuid": "0fa1d68b-0bd4-4882-9ae3-30c5f740f71f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "https://bsky.app/profile/doomfan1.bsky.social/post/3ls7cnrhzz22y", "content": "", "creation_timestamp": "2025-06-22T14:46:05.571809Z"}, {"uuid": "dc40508e-e290-44e0-8f54-81cd14a6dcad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-38063", "type": "seen", "source": "https://infosec.exchange/users/alexandreborges/statuses/114407836264517428", "content": "", "creation_timestamp": "2025-04-27T03:37:21.711191Z"}, {"uuid": "2559f5d1-bc7c-4485-8e64-1f8d0a0ddfa2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "https://bsky.app/profile/alexandreborges.bsky.social/post/3lnrd6r26ks2g", "content": "", "creation_timestamp": "2025-04-27T03:37:31.696182Z"}, {"uuid": "e9541d74-16c3-4ead-8017-405e13069692", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "https://vulnerability.circl.lu/comment/4be2fca3-59f3-437e-a4db-7c0b2f8acb81", "content": "", "creation_timestamp": "2024-08-28T08:55:21.234923Z"}, {"uuid": "11641495-d3eb-4808-93d0-bf22e47f1980", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "https://bsky.app/profile/petersandor.name/post/3ls3ledq7272n", "content": "", "creation_timestamp": "2025-06-21T03:11:11.500777Z"}, {"uuid": "a32ee4b5-0335-452b-aaa3-9d1ed333081f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3lwbpstr2a22z", "content": "", "creation_timestamp": "2025-08-13T11:27:38.136620Z"}, {"uuid": "8b927323-a14d-4b0b-8985-3d36b779d780", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "https://bsky.app/profile/it-administrator.de/post/3lomjcmeuu62w", "content": "", "creation_timestamp": "2025-05-07T23:08:56.031149Z"}, {"uuid": "44f9c64d-9841-4184-93dc-0513864b714d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "https://bsky.app/profile/lobsters-feed.bsky.social/post/3lqf63wjsyp25", "content": "", "creation_timestamp": "2025-05-30T11:50:04.962615Z"}, {"uuid": "9906cfc5-4429-471b-baf0-676b08191a1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "MISP/af1fbe07-e10c-40c4-844e-d4419bdf6f80", "content": "", "creation_timestamp": "2025-08-22T13:26:18.000000Z"}, {"uuid": "a6e15c50-12f5-40a1-bab1-81999e803522", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "https://bsky.app/profile/thebeardofknow.bsky.social/post/3m22etrfzsb25", "content": "", "creation_timestamp": "2025-09-30T11:03:28.715861Z"}, {"uuid": "94eb19f7-aaba-440c-a1c2-b8b174027c90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8366", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-38063 Research Tool\nURL\uff1ahttps://github.com/haroonawanofficial/CVE-2024-38063-Research-Tool\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-08-26T06:22:11.000000Z"}, {"uuid": "5abfdaba-757a-4c95-8bc6-eeca5d49134e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8474", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aC# PoC for CVE-2024-38063\nURL\uff1ahttps://github.com/meetox80/CVE-2024-38063\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-09-07T19:37:43.000000Z"}, {"uuid": "03829633-5c29-4e09-ac21-9ca3392ebf09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1352", "content": "", "creation_timestamp": "2024-08-14T04:00:00.000000Z"}, {"uuid": "1ea1ea2a-7296-46cc-9d30-0dbfbe273061", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8502", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-38063 - Remotely Exploiting The Kernel Via IPv6\nURL\uff1ahttps://github.com/Faizan-Khanx/CVE-2024-38063\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-09-10T10:20:34.000000Z"}, {"uuid": "de8abbaf-217d-4da2-b0bd-c018b2895e4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/195", "content": "#tools\n#Blue_Team_Techniques\n1. ShellSweepX - ML-powered web shell detection and analysis platform\nhttps://github.com/splunk/ShellSweep/wiki/ShellSweepX\n2. CVE-2024-38063 mitigation script by disabling ipv6 of all interfaces\nhttps://github.com/diegoalbuquerque/CVE-2024-38063", "creation_timestamp": "2024-08-20T11:27:20.000000Z"}, {"uuid": "23450b92-bd16-403b-b28d-117cc130a22d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8312", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aCVE-2024-38063 RCE ipv6 Windows\nURL\uff1ahttps://github.com/Skim1k/CVE-2024-38063\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2024-08-20T11:15:26.000000Z"}, {"uuid": "6c14d0ef-7b8c-499f-9c90-e49aee13632d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/cKure/13552", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 CVE-2024-38063 - Remotely Exploiting The Kernel Via IPv6.\n\nhttps://malwaretech.com/2024/08/exploiting-CVE-2024-38063.html", "creation_timestamp": "2024-08-29T17:12:43.000000Z"}, {"uuid": "160931ff-b1aa-48f5-a7c6-bf6f816f0c3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8275", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-38063 VB\nURL\uff1ahttps://github.com/noradlb1/CVE-2024-38063-VB\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-08-17T06:43:19.000000Z"}, {"uuid": "8b7f6be8-b32f-421f-b12b-104792e225a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "https://t.me/GithubRedTeam/8309", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aPHP CGI Argument Injection (CVE-2024-4577) RCE\nURL\uff1ahttps://github.com/almogopp/Disable-IPv6-CVE-2024-38063-Fix\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-08-20T08:52:27.000000Z"}, {"uuid": "aa85d7ea-b58e-4d1c-bc7b-b852d0aeae2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8334", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-38063 research so you don't have to.\nURL\uff1ahttps://github.com/Th3Tr1ckst3r/CVE-2024-38063\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-08-23T07:42:57.000000Z"}, {"uuid": "4eab387b-c794-4d13-8abd-01657e53d9d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/cKure/13677", "content": "\u25a0\u25a0\u25a0\u25a0\u25a1 Breaking down Windows critical vulnerability CVE\u20112024\u201138063.\n\nhttps://bi.zone/eng/expertise/blog/analiz-kriticheskoy-uyazvimosti-windows-cve-2024-38063/", "creation_timestamp": "2024-09-24T10:36:54.000000Z"}, {"uuid": "4d053ce7-3dd3-4ef7-ae41-34948d047d32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/196", "content": "#exploit\nCVE-2024-38063:\nWindows TCP/IP RCE\n]-&gt; https://github.com/Sachinart/CVE-2024-38063-POC", "creation_timestamp": "2024-08-20T11:27:20.000000Z"}, {"uuid": "acaf75af-004e-4a0a-b3fe-e971c6f25572", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8426", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aCVE-2024-38063 is a critical security vulnerability in the Windows TCP/IP stack that allows for remote code execution (RCE)\nURL\uff1ahttps://github.com/ThemeHackers/CVE-2024-38063\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2024-09-01T03:36:21.000000Z"}, {"uuid": "7f3f6002-2b19-4661-a278-47a27217adf7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8271", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-38063 exploits for sale\nURL\uff1ahttps://github.com/proxykingdev/CVE-2024-38063\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-08-17T06:43:50.000000Z"}, {"uuid": "bf4e443a-3d1e-4018-a1c9-8756b3d29af6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8434", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aAn educational tool which demonstrates advanced networking techniques being used in the wild with CVE-2024-38063.\nURL\uff1ahttps://github.com/Th3Tr1ckst3r/Denyv6\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-09-02T05:03:18.000000Z"}, {"uuid": "c85e3408-dcd2-44ac-ba00-1d35e3da2da9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8429", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aLPE of CVE-2024-26230\nURL\uff1ahttps://github.com/KernelKraze/CVE-2024-38063_PoC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-09-01T09:25:15.000000Z"}, {"uuid": "001af272-d357-4fb9-be74-e70a92455589", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8359", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1apoc for CVE-2024-38063 (RCE in tcpip.sys)\nURL\uff1ahttps://github.com/ynwarcs/CVE-2024-38063\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-08-24T19:18:11.000000Z"}, {"uuid": "29e03bfb-c28d-49de-bafa-750e120c165e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8425", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-38063 is a critical security vulnerability in the Windows TCP/IP stack that allows for remote code execution (RCE)\nURL\uff1ahttps://github.com/ThemeHackers/CVE-2024-38063.py\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-09-01T03:36:42.000000Z"}, {"uuid": "14d985dd-f676-45f4-95f5-916b4e01c849", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8796", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aC:\\\\Users\\\\HP\\\\Downloads\\\\CVE-2024-38063\nURL\uff1ahttps://github.com/VuongHuuAn/CVE-2024-38063\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-10-21T05:41:39.000000Z"}, {"uuid": "32d6a81e-22b2-499f-a8f4-ead285e23798", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8566", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aKode Eksploitasi CVE-2024-38063\nURL\uff1ahttps://github.com/ArenaldyP/CVE-2024-38063-Medium\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-09-21T17:36:49.000000Z"}, {"uuid": "504ff0f5-450a-4486-8c36-fb67e38485ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8741", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aVulnerability CVE-2024-38063\nURL\uff1ahttps://github.com/thanawee321/CVE-2024-38063\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-10-15T03:22:23.000000Z"}, {"uuid": "fd5763a7-fb0f-489a-b8ba-5380a8139b5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8388", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aP/IP IPv6(CVE-2024-38063)\nURL\uff1ahttps://github.com/PumpkinBridge/Windows-CVE-2024-38063\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-08-28T01:52:53.000000Z"}, {"uuid": "a9706011-1ada-45cb-830a-3a8662d5d064", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8387", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aP/IP IPv6(CVE-2024-38063)\nURL\uff1ahttps://github.com/PumpkinBridge/Windows-TCP-IP-IPv6-CVE-2024-38063-\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-08-28T01:48:42.000000Z"}, {"uuid": "7b0baaa0-023d-4d13-a014-114be002cd3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "Telegram/6JNWkHxmOLxnzj-gqbhACG71bXlu-RU-I9xQKz5JEox5C9Y", "content": "", "creation_timestamp": "2025-10-23T15:00:07.000000Z"}, {"uuid": "557a64c9-b3c0-4ed5-a830-142b0d7d2986", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9052", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aPoC for Windows' IPv6 CVE-2024-38063\nURL\uff1ahttps://github.com/Dragkob/CVE-2024-38063\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-11-16T17:24:35.000000Z"}, {"uuid": "196df592-8ad1-40ff-ba5d-306e88d3e4f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "Telegram/9lqDn3vbpZ1A5RqEPkrgIqaAEuHAyoN6XGpAPxfZCqfrIyw", "content": "", "creation_timestamp": "2024-09-04T23:20:20.000000Z"}, {"uuid": "c284d048-8aa1-461a-a891-8daf0dd1bcf6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/10476", "content": "\u200aBeware of Fake PoC Exploits for 0-Click RCE CVE-2024-38063 on GitHub\n\nhttps://securityonline.info/beware-of-fake-poc-exploits-for-0-click-rce-cve-2024-38063-on-github/", "creation_timestamp": "2024-08-19T08:52:43.000000Z"}, {"uuid": "ecd514ce-d7f4-46b4-a994-1ca1e24ba09e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/Celestial_Pulse24/5192", "content": "Enjoy \ud83d\ude08", "creation_timestamp": "2024-08-22T20:11:54.000000Z"}, {"uuid": "8b1d171a-1019-4dee-9335-7eb3a188e50c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/R0_Crew/2115", "content": "POC for trigerring CVE-2024-38063 (RCE in tcpip.sys)\n\nhttps://github.com/ynwarcs/CVE-2024-38063\n\n#expdev #poc", "creation_timestamp": "2024-08-26T15:34:00.000000Z"}, {"uuid": "af0dbc0f-64ad-4895-bc8b-3be5a44bee37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "https://t.me/itsec_news/4605", "content": "\u200b\u26a1\ufe0fZero-click \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0432\u043e \u0432\u0441\u0435\u0445 \u0432\u0435\u0440\u0441\u0438\u044f\u0445 Windows\n\n\ud83d\udcacMicrosoft \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0434\u0438\u043b\u0430 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u043e \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 TCP/IP, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043a\u043e\u0434\u0430 (RCE) \u043d\u0430 \u0432\u0441\u0435\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 Windows \u0441 \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u043d\u044b\u043c \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u043e\u043c IPv6.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2024-38063 (\u043e\u0446\u0435\u043d\u043a\u0430 CVSS: 9.8) \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0446\u0435\u043b\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u044b\u043c \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435\u043c (Integer Underflow) \u0438 \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438 \u0434\u043b\u044f \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u0431\u0443\u0444\u0435\u0440\u0430 \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 Windows 10, Windows 11 \u0438 Windows Server. \u041e\u0448\u0438\u0431\u043a\u0430 \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438\u0437 Kunlun Lab, \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u043c \u043f\u043e\u0434 \u043f\u0441\u0435\u0432\u0434\u043e\u043d\u0438\u043c\u043e\u043c XiaoWei\n\nXiaoWei \u043f\u043e\u0434\u0447\u0435\u0440\u043a\u043d\u0443\u043b, \u0447\u0442\u043e \u0438\u0437-\u0437\u0430 \u0441\u0435\u0440\u044c\u0451\u0437\u043d\u043e\u0441\u0442\u0438 \u0443\u0433\u0440\u043e\u0437\u044b \u043e\u043d \u043d\u0435 \u0431\u0443\u0434\u0435\u0442 \u0440\u0430\u0441\u043a\u0440\u044b\u0432\u0430\u0442\u044c \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u0434\u0435\u0442\u0430\u043b\u0438 \u0432 \u0431\u043b\u0438\u0436\u0430\u0439\u0448\u0435\u0435 \u0432\u0440\u0435\u043c\u044f. \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u0442\u0430\u043a\u0436\u0435 \u043e\u0442\u043c\u0435\u0442\u0438\u043b, \u0447\u0442\u043e \u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u043a\u0430 IPv6 \u0447\u0435\u0440\u0435\u0437 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0439 \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440 Windows \u043d\u0435 \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0442\u0438\u0442 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0442\u0430\u043a \u043a\u0430\u043a \u043e\u0448\u0438\u0431\u043a\u0430 \u0430\u043a\u0442\u0438\u0432\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0434\u043e \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u043f\u0430\u043a\u0435\u0442\u043e\u0432 \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u043e\u043c.\n\nMicrosoft \u0432 \u0441\u0432\u043e\u0451\u043c \u043e\u0444\u0438\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u043c \u0443\u0432\u0435\u0434\u043e\u043c\u043b\u0435\u043d\u0438\u0438 \u043f\u043e\u044f\u0441\u043d\u0438\u043b\u0430, \u0447\u0442\u043e \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0435 \u043c\u043e\u0433\u0443\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u043e\u0448\u0438\u0431\u043a\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u043c\u043d\u043e\u0433\u043e\u043a\u0440\u0430\u0442\u043d\u043e \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u044f \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u043f\u0430\u043a\u0435\u0442\u044b IPv6. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u043e\u0442\u043b\u0438\u0447\u0430\u0435\u0442\u0441\u044f \u043d\u0438\u0437\u043a\u043e\u0439 \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u044c\u044e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438, \u0447\u0442\u043e \u043f\u043e\u0432\u044b\u0448\u0430\u0435\u0442 \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e\u0441\u0442\u044c \u0435\u0451 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u0432 \u0430\u0442\u0430\u043a\u0430\u0445. \u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u043e\u0442\u043c\u0435\u0442\u0438\u043b\u0430, \u0447\u0442\u043e \u0430\u043d\u0430\u043b\u043e\u0433\u0438\u0447\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0440\u0430\u043d\u0435\u0435 \u0443\u0436\u0435 \u0431\u044b\u043b\u0438 \u043e\u0431\u044a\u0435\u043a\u0442\u0430\u043c\u0438 \u0430\u0442\u0430\u043a, \u0447\u0442\u043e \u0434\u0435\u043b\u0430\u0435\u0442 \u0434\u0430\u043d\u043d\u0443\u044e \u043e\u0448\u0438\u0431\u043a\u0443 \u043e\u0441\u043e\u0431\u0435\u043d\u043d\u043e \u043f\u0440\u0438\u0432\u043b\u0435\u043a\u0430\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u0434\u043b\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u0432.\n\n\u0414\u043b\u044f \u0442\u0435\u0445, \u043a\u0442\u043e \u043d\u0435 \u043c\u043e\u0436\u0435\u0442 \u043d\u0435\u043c\u0435\u0434\u043b\u0435\u043d\u043d\u043e \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, Microsoft \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442 \u043e\u0442\u043a\u043b\u044e\u0447\u0438\u0442\u044c IPv6, \u0447\u0442\u043e\u0431\u044b \u0441\u043d\u0438\u0437\u0438\u0442\u044c \u0440\u0438\u0441\u043a \u0430\u0442\u0430\u043a\u0438. \u041e\u0434\u043d\u0430\u043a\u043e \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u0435\u0442, \u0447\u0442\u043e \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435 IPv6 \u043c\u043e\u0436\u0435\u0442 \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u0441\u0431\u043e\u0438 \u0432 \u0440\u0430\u0431\u043e\u0442\u0435 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u043e\u0432 Windows, \u0442\u0430\u043a \u043a\u0430\u043a \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043e\u0431\u044f\u0437\u0430\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u0447\u0430\u0441\u0442\u044c\u044e \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b, \u043d\u0430\u0447\u0438\u043d\u0430\u044f \u0441 \u0432\u0435\u0440\u0441\u0438\u0438 Windows Vista \u0438 Windows Server 2008.\n\n\u0412 Trend Micro \u043d\u0430\u0437\u0432\u0430\u043b\u0438 CVE-2024-38063 \u043e\u0434\u043d\u043e\u0439 \u0438\u0437 \u0441\u0430\u043c\u044b\u0445 \u0441\u0435\u0440\u044c\u0451\u0437\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0445 Microsoft \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 \u0442\u0435\u043a\u0443\u0449\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438. \u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u043f\u043e\u0434\u0447\u0435\u0440\u043a\u043d\u0443\u043b\u0430, \u0447\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0438\u043c\u0435\u0435\u0442 \u0441\u0442\u0430\u0442\u0443\u0441 \u00abwormable\u00bb, \u0447\u0442\u043e \u043e\u0437\u043d\u0430\u0447\u0430\u0435\u0442 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0435\u0451 \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u043c\u0435\u0436\u0434\u0443 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u043c\u0438 \u0431\u0435\u0437 \u0443\u0447\u0430\u0441\u0442\u0438\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f, \u0430\u043d\u0430\u043b\u043e\u0433\u0438\u0447\u043d\u043e \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u043d\u044b\u043c \u0447\u0435\u0440\u0432\u044f\u043c. Trend Micro \u0442\u0430\u043a\u0436\u0435 \u043d\u0430\u043f\u043e\u043c\u043d\u0438\u043b\u0430, \u0447\u0442\u043e IPv6 \u0432\u043a\u043b\u044e\u0447\u0435\u043d \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e \u043f\u0440\u0430\u043a\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u043d\u0430 \u0432\u0441\u0435\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445, \u0447\u0442\u043e \u0443\u0441\u043b\u043e\u0436\u043d\u044f\u0435\u0442 \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0449\u0435\u043d\u0438\u0435 \u0430\u0442\u0430\u043a.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2024-08-15T17:05:04.000000Z"}, {"uuid": "d8a75afe-e5b5-46ee-9102-e59e7f063b15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "Telegram/DK4BbVzmE_Jdht-pfKWYiPS8pPyh5W_Tab9UrU56o57GOsg", "content": "", "creation_timestamp": "2026-04-24T15:00:07.000000Z"}, {"uuid": "d7dbee52-0535-4765-8d2d-e50d51aa0b06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/tech_b0lt_Genona/4623", "content": "\u041f\u0430\u0440\u0443 \u043d\u0435\u0434\u0435\u043b\u044c \u043d\u0430\u0437\u0430\u0434 \u0431\u044b\u043b\u0430 \u043d\u043e\u0432\u043e\u0441\u0442\u044c, \u0447\u0442\u043e \u0431\u044b\u043b\u0430 \u043d\u0430\u0439\u0434\u0435\u043d\u0430 \u043e\u0448\u0438\u0431\u043a\u0430, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u043b\u0430  \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043a\u043e\u0434\u0430 \u043d\u0430 \u0432\u0441\u0435\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 \u0441 Windows 10, 11 \u0438 Windows Server\n\n\u041f\u043e\u0447\u0438\u0442\u0430\u0442\u044c \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u0435\u0439 \u043c\u043e\u0436\u043d\u043e, \u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, \u0442\u0443\u0442 https://xakep.ru/2024/08/15/cve-2024-38063/\n\n\u00ab\u0421\u0430\u043c\u043e\u0439 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0439 [\u0432 \u044d\u0442\u043e\u043c \u043c\u0435\u0441\u044f\u0446\u0435], \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c TCP/IP, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443, \u043d\u0435 \u043f\u0440\u043e\u0448\u0435\u0434\u0448\u0435\u043c\u0443 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044e, \u0434\u043e\u0431\u0438\u0442\u044c\u0441\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430, \u043f\u0440\u043e\u0441\u0442\u043e \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u044f \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043f\u043e\u0434\u0433\u043e\u0442\u043e\u0432\u043b\u0435\u043d\u043d\u044b\u0435 \u043f\u0430\u043a\u0435\u0442\u044b IPv6 \u0446\u0435\u043b\u0438, \u2014 \u043f\u0438\u0448\u0435\u0442 \u0427\u0430\u0439\u043b\u0434\u0441. \u2014 \u042d\u0442\u043e \u043e\u0437\u043d\u0430\u0447\u0430\u0435\u0442, \u0447\u0442\u043e \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u043e\u0431\u043b\u0430\u0434\u0430\u0435\u0442 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u043e\u043c \u0447\u0435\u0440\u0432\u044f. \u0412\u044b \u043c\u043e\u0436\u0435\u0442\u0435 \u043e\u0442\u043a\u043b\u044e\u0447\u0438\u0442\u044c IPv6, \u0447\u0442\u043e\u0431\u044b \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0442\u0438\u0442\u044c \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044e, \u043d\u043e IPv6 \u0432\u043a\u043b\u044e\u0447\u0435\u043d \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e \u043f\u0440\u0430\u043a\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u043d\u0430 \u0432\u0441\u0435\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445\u00bb.\n\n\u0412\u043e\u0442 \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0430 Microsoft \u0441 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0435\u0439\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38063\n\n\u0418 \u0432\u043e\u0442 \u043f\u043e\u0434\u044a\u0435\u0445\u0430\u043b PoC \u0441 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u044b\u043c\u0438 \u043e\u0431\u044a\u044f\u0441\u043d\u0435\u043d\u0438\u044f\u043c\u0438 \u0432 README\nhttps://github.com/ynwarcs/CVE-2024-38063", "creation_timestamp": "2024-08-27T06:43:42.000000Z"}, {"uuid": "ee216b0d-6de2-4525-b51a-d68d7768159d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/R0_Crew/2116", "content": "Exploiting the Windows Kernel via Malicious IPv6 Packets (CVE-2024-38063)\n\nhttps://malwaretech.com/2024/08/exploiting-CVE-2024-38063.html\n\n#expdev #poc", "creation_timestamp": "2024-08-27T22:21:03.000000Z"}, {"uuid": "7c2b03a9-fe5a-4583-ae07-86a01afccb66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/orderofsixangles/2459", "content": ".NET Crash Dump Analysis\n\nML for binary diffing (\u0441\u043b\u0430\u0439\u0434\u044b)\n\nA step-by-step guide to writing an iOS kernel exploit\n\nThe Art of Fuzzing: A Deep Dive into Software Security\n\nLearning Binary Ninja for Reverse Engineering\n\nOpaque Predicates and How to Hunt Them\n\nPoC Windows kernel driver for detect DMA devices\n\nImprove Your Forensic Analyses with hashlookup\n\n\u0411\u043b\u043e\u0433\n\nWindows kernel debugger for Linux hosts running Windows under KVM/QEMU\n\nWindows Kernel Pool Exploitation CVE-2021-31956 - Part 2\n\nLinux RCU internal\n\nUnidbg to production\n\nHunting for CVE-2024-38063 by diffing Tcpip.sys with Ghidra", "creation_timestamp": "2024-09-26T04:43:27.000000Z"}, {"uuid": "726e839f-2f9e-47c9-8357-68daf1160178", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "Telegram/EYkASGxj3Tiuz3kIHRMz13gpRd2GwQ5wKmXB5D8I7ZTChs4", "content": "", "creation_timestamp": "2025-07-23T21:00:04.000000Z"}, {"uuid": "3d1eb102-6ff9-4145-aaa6-b59491ca853f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/SpiderCodeCommunity1/12", "content": "\u0633\u0645\u0639\u062a \u0639\u0646 \u0644\u0627\u062e\u062a\u0631\u0627\u0642 \u0628\u0644 ip \u061f\n\n\n\u0627\u064a \u064a \u0633\u0628\u0627\u064a\u062f\u0631 \u0627\u0646\u062a \u0634\u0627\u0631\u0628 \u0627\u064a \u0639\u0644\u064a \u0627\u0644\u0635\u0628\u062d \u0634\u0643\u0644 \u0627\u0644\u0635\u064a\u0627\u0645 \u0645 \u0627\u062b\u0631 \u0639\u0644\u064a\u0643\n\n\n\u0644\u0627 \u0645\u0634 \u0645\u0648\u062b\u0631 \u0639\u0644\u064a\u0627 \u0648\u0644\u0627 \u062d\u0627\u062c\u0647\n\n\n\u062a\u062d\u0630\u064a\u0631 * \u0645\u062d\u062a\u0648\u064a \u0642\u0646\u0627\u0647 \u0644\u0647 \u062d\u0642\u0648\u0642 \u0637\u0628\u0639 \u0648 \u0646\u0634\u0631 *\n\n\u0628\u0635 \u064a\u0639\u0632\u064a\u0632\u064a \u0641 \u0634\u0647\u0631 \u0623\u063a\u0633\u0637\u0633 \u0644 \u0639\u0627\u0645 2024 \u062a\u0645 \u0627\u0643\u062a\u0634\u0627\u0641 \u062b\u063a\u0631\u0647 zero Click \n\n\u064a\u0639\u0646\u064a \u0627\u064a \u0632\u064a\u0631\u0648 \u0643\u0644\u064a\u0643 \u062f\u064a \u061f\n\n\u0628\u0635 \u064a\u0639\u0632\u064a\u0632\u064a \u0627\u0644 zero click \u062f\u064a \u062b\u063a\u0631\u0647 \u0628\u062a\u0645 \u0645\u0646 \u063a\u064a\u0631 \u062a\u062f\u062e\u0644 \u0645\u0633\u062a\u062e\u062f\u0645 \n\n\u0646\u0631\u062c\u0639 \u0644 \u0645\u0648\u0636\u0648\u0639\u0646\u0627\n\n\u062d\u0635\u0644 \u0627\u0646 \u0641 \u0628\u0631\u062a\u0648\u0643\u0648\u0644 ip \n( Internet Protocol )\n\u0648 TCP\n\n( Transmission Control Protocol )\n\n\u062a\u0645 \u0627\u0643\u062a\u0634\u0627\u0641 \u0632\u064a\u0631\u0648 \u0643\u0644\u064a\u0643 \u0641\u064a\u0647\u0645 \u062a\u062d\u062f\u064a\u062f\u0627 \u0641 \u0648\u064a\u0646\u062f\u0648\u0632 \u0648 \u0627\u0644\u062b\u063a\u0631\u0647 \u062d\u0635\u0644\u062a \u0628\u0633\u0628\u0628 \u062e\u0644\u0644 \u0641\u064a \u0645\u0639\u0627\u0644\u062c\u0647 ipv6 \u0648 \u062f\u0627 \u0627\u0644\u064a \u062e\u0644\u064a \u0627\u0644\u0645\u062e\u062a\u0631\u0642\u064a\u0646 \u064a\u0642\u062f\u0631\u0648 \u064a\u0646\u0641\u0630\u0648 \u0647\u062c\u0645\u0627\u062a \u0628\u0631\u0645\u062c\u064a\u0629 \u0639\u0646 \u0628\u0639\u062f \u0648 \u062f\u0627 \u0627\u0644\u064a \u062e\u0644\u064a \u0627\u0644\u0645\u0647\u0627\u062c\u0645 \u064a\u062a\u062d\u0643\u0645 \u0641\u0644 \u062c\u0647\u0627\u0632 \u0643\u0627\u0645\u0644 \u062f\u0648\u0646 \u062a\u062f\u062e\u0644 \u0627\u0644\u0634\u062e\u0635\n\n\u0647\u062a\u0642\u0648\u0644\u064a \u0647\u0647\u0647\u0647 \u0645\u0639\u0627\u064a\u0627 \u0648\u064a\u0646\u062f\u0648\u0632 11 \u0627\u0648 10 \u0645\u0634 \u0647\u064a\u062d\u0635\u0644 \u062d\u0627\u062c\u0647 \n\n\u0639\u0627\u064a\u0632 \u0627\u0642\u0648\u0644\u0643 \u0627\u0646\u0648 \u0643\u0627\u0646 \u0628\u064a\u0627\u062b\u0631 \u0639\u0644\u064a\u0647\u0645 \u0648 \u0643\u0645\u0627\u0646 \u0639\u0644\u064a \n\nWindows Server 2016\n\nWindows Server 2019\n\nWindows Server 2022\n\n\u0637\u064a\u0628 \u0627\u0644\u062d\u0644 \u0627\u064a \u061f\n\n\u0627\u0646\u0643 \u062a\u0642\u0641\u0644 \u0628\u0631\u062a\u0648\u0643\u0648\u0644 ipv6 \u0644\u0648 \u0627\u0635\u062f\u0627\u0631 cve \u0645\u0634 \u0646\u0632\u0644\u0648 \u062a\u062d\u062f\u064a\u062b \u0639\u0646\u062f\u0643 \u0648 \u062a\u062a\u0627\u0628\u0639 \u0627\u0644\u0634\u0628\u0643\u0647 \u0639\u0646\u062f\u0643 \u0648 \u0628\u0633 \n\n\u0634\u0643\u0631\u0627 \u0644 \u0642\u0631\u0627\u0626\u0647 \u0627\u0644\u0645\u0642\u0627\u0644 \u0627\u062a\u0645\u0646\u0647 \u064a\u0639\u062c\u0628\u0643\u0645 \u2764\ufe0f \n\n\n\u0627\u0633\u0645 cve \n\nCVE-2024-38063\n\n\n\u0645\u0635\u0627\u062f\u0631 :\n\n\n\nhttps://bi-zone.medium.com/breaking-down-cve-2024-38063-remote-exploitation-of-the-windows-kernel-bdae36f5f61d\n\n\nhttps://www.obrela.com/advisory/microsoft-windows-critical-vulnerability-with-cve-2024-38063/\n\n\n\nhttps://www.rescana.com/post/windows-tcp-ip-vulnerability-cve-2024-38063-what-you-need-to-know", "creation_timestamp": "2025-03-18T07:37:00.000000Z"}, {"uuid": "a101ccf9-8d0d-463f-a014-0aa848a33ccf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "https://t.me/HackingInsights/10680", "content": "Where are we with CVE-2024-38063: Microsoft IPv6 Vulnerability, (Tue, Aug 20th)\nhttps://ift.tt/1WLS3Mq", "creation_timestamp": "2024-08-21T06:34:29.000000Z"}, {"uuid": "36c583ab-94a9-41b2-b652-b16572916477", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "exploited", "source": "https://t.me/CyberBulletin/1646", "content": "\u26a1\ufe0f1.7M Israeli Credit Cards for Sale on Darknet \n\nA massive database of 1.7 million Israeli credit cards listed for sale on a darknet forum. \n\nThe data includes card numbers, CVVs, IDs, and phone numbers.\n\n\ud83d\udcb3 Price: Full DB: $100,000\n\nExploited a critical vulnerability (CVE-2024-38063) in an Israeli clearing company, through a phishing campaign. \n\n#CyberBulletin", "creation_timestamp": "2024-11-29T06:26:03.000000Z"}, {"uuid": "b1113486-9b69-4cd1-a9f7-eecc6a2e1891", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "https://t.me/breachwatcherschat/73", "content": "Hmm CVE-2024-38063", "creation_timestamp": "2024-08-19T12:24:50.000000Z"}, {"uuid": "d7d7e63b-56ed-433e-8a8a-529601161e06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "https://t.me/CyberBulletin/2427", "content": "\u26a1CVE-2024-38063 (CVSS 9.8): Windows RCE Vulnerability Found in Pepperl+Fuchs HMI Devices.\n\n#CyberBulletin", "creation_timestamp": "2025-02-28T05:03:39.000000Z"}, {"uuid": "3ecd062c-87f8-4b0b-9ee1-1295806e56a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/9835", "content": "\u200aCVE-2024-38063 (CVSS 9.8): 0-Click RCE Affects All Windows Systems\n\nhttps://securityonline.info/cve-2024-38063-cvss-9-8-0-click-rce-affects-all-windows-systems/", "creation_timestamp": "2024-08-14T09:24:18.000000Z"}, {"uuid": "fea976c1-6d17-4417-98e7-408c7bebc69d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "https://t.me/bizone_channel/1661", "content": "\u2699\ufe0f \u0412\u0441\u0435 \u0445\u0430\u0431\u0440\u0430\u0441\u0442\u0430\u0442\u044c\u0438 \u0437\u0430 2024 \u0433\u043e\u0434\n\n\u0412 \u044d\u0442\u043e\u043c \u0433\u043e\u0434\u0443 \u043c\u044b \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0438 9 \u0431\u043e\u043b\u044c\u0448\u0438\u0445 \u0440\u0435\u0441\u0435\u0440\u0447\u0435\u0439 \u0441\u0440\u0435\u0434\u043d\u0435\u0433\u043e \u0438 \u0432\u044b\u0441\u043e\u043a\u043e\u0433\u043e \u0443\u0440\u043e\u0432\u043d\u044f \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u0438. \u0421\u043e\u0431\u0440\u0430\u043b\u0438 \u0438\u0445 \u0432 \u043e\u0434\u0438\u043d \u043f\u043e\u0441\u0442, \u0447\u0442\u043e\u0431\u044b \u0432\u044b \u0442\u043e\u0447\u043d\u043e \u043d\u0438\u0447\u0435\u0433\u043e \u043d\u0435 \u043f\u0440\u043e\u043f\u0443\u0441\u0442\u0438\u043b\u0438.\n\n\ud83d\udd35\u0421\u043a\u0430\u0437 \u043e \u0442\u043e\u043c, \u043a\u0430\u043a \u043f\u0435\u043d\u0442\u0435\u0441\u0442\u0435\u0440\u044b \u0442\u0440\u0430\u0444\u0438\u043a \u0441\u043a\u0440\u044b\u0432\u0430\u044e\u0442\n\u0413\u043e\u0432\u043e\u0440\u0438\u043c \u043e \u043c\u0430\u0441\u043a\u0438\u0440\u043e\u0432\u043a\u0435 \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u0442\u0440\u0430\u0444\u0438\u043a\u0430 \u043c\u0435\u0436\u0434\u0443 \u04212-\u0430\u0433\u0435\u043d\u0442\u043e\u043c \u0438 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u043c, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043e \u043d\u0435\u0442\u0440\u0438\u0432\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u0441\u043f\u043e\u0441\u043e\u0431\u0430\u0445 \u044d\u0442\u043e \u0441\u0434\u0435\u043b\u0430\u0442\u044c.\n\n\ud83d\udd35\u041d\u043e\u0432\u0430\u044f \u0442\u0435\u0445\u043d\u0438\u043a\u0430 \u0441\u043a\u0440\u044b\u0442\u043e\u0433\u043e \u0438\u0437\u0432\u043b\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u0430\u043d\u043d\u044b\u0445 \u0438\u0437 \u0440\u0435\u0435\u0441\u0442\u0440\u0430: \u0430\u043d\u0430\u043b\u0438\u0437 \u0438 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u043e \u0437\u0430\u0449\u0438\u0442\u0435\n\u0421\u0442\u0430\u0442\u044c\u044f \u043e\u0431 \u0443\u0442\u0438\u043b\u0438\u0442\u0435, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0443\u0447\u0435\u0442\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 \u0438\u0437 \u0440\u0435\u0435\u0441\u0442\u0440\u0430 Windows \u0431\u0435\u0437 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0441 \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u043e\u0439. \u0420\u0430\u0441\u0441\u043a\u0430\u0437\u044b\u0432\u0430\u0435\u043c \u043e \u0441\u043f\u043e\u0441\u043e\u0431\u0435 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0435\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0438 \u0438 \u0440\u0430\u0437\u043d\u044b\u0445 \u043f\u043e\u0434\u0445\u043e\u0434\u0430\u0445 \u043a \u0437\u0430\u0449\u0438\u0442\u0435.\n\n\ud83d\udd35\u041f\u043e\u0434 \u043a\u0430\u043f\u043e\u0442\u043e\u043c DarkGate: \u0440\u0430\u0437\u0431\u0438\u0440\u0430\u0435\u043c \u0412\u041f\u041e-\u043c\u0443\u043b\u044c\u0442\u0438\u0442\u0443\u043b\n\u0420\u0430\u0441\u0441\u043a\u0430\u0437\u044b\u0432\u0430\u0435\u043c \u043f\u0440\u043e \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0435 \u041f\u041e, \u043a\u043e\u0442\u043e\u0440\u043e\u0435 \u0441\u043e\u0447\u0435\u0442\u0430\u0435\u0442 \u0432 \u0441\u0435\u0431\u0435 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 \u0437\u0430\u0433\u0440\u0443\u0437\u0447\u0438\u043a\u0430, \u0441\u0442\u0438\u043b\u0435\u0440\u0430 \u0438 RAT. \u041a\u0430\u043a \u043e\u043d\u043e \u0431\u044b\u043b\u043e \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0430\u043d\u043e, \u0434\u043b\u044f \u0447\u0435\u0433\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0438 \u043f\u043e\u0447\u0435\u043c\u0443 \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u0435\u0442\u0441\u044f \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 \u043d\u0430 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u0432\u043e\u043f\u0440\u0435\u043a\u0438 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044e \u043e\u0442 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0430.\n\n\ud83d\udd35\u0410\u043d\u0430\u043b\u0438\u0437 CVE-2024-38063: \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u0430\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u044f\u0434\u0440\u0430 Windows\n\u0420\u0430\u0437\u0431\u0438\u0440\u0430\u0435\u043c, \u043a\u0430\u043a \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u043e\u0448\u0438\u0431\u043a\u0430 \u0432 \u0441\u0435\u0442\u0435\u0432\u043e\u043c \u0441\u0442\u0435\u043a\u0435 Windows, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043c\u0430\u043a\u0441\u0438\u043c\u0430\u043b\u044c\u043d\u044b\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u0431\u0435\u0437 \u043a\u0430\u043a\u0438\u0445-\u043b\u0438\u0431\u043e \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0439 \u0441\u043e \u0441\u0442\u043e\u0440\u043e\u043d\u044b \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f. \n\n\ud83d\udd35\u041a\u0430\u043a \u044f \u00ab\u041a\u0430\u043f\u0441\u0443\u043b\u0443 \u041d\u0435\u043e\u00bb \u043e\u0442 VK \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043b\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u043c\u043d\u043e\u0439 \u043a\u043e\u043b\u043e\u043d\u043a\u0438 VK. \u0427\u0438\u0442\u0430\u0439\u0442\u0435 \u0432 \u0441\u0442\u0430\u0442\u044c\u0435 \u043e \u0442\u043e\u043c, \u0447\u0442\u043e \u0443\u0434\u0430\u043b\u043e\u0441\u044c \u043d\u0430\u0439\u0442\u0438 \u0438 \u0441 \u0447\u0435\u043c \u043f\u0440\u0438\u0448\u043b\u043e\u0441\u044c \u0441\u0442\u043e\u043b\u043a\u043d\u0443\u0442\u044c\u0441\u044f \u0437\u0430 \u0432\u0440\u0435\u043c\u044f \u043f\u0440\u043e\u0435\u043a\u0442\u0430.\n\n\ud83d\udd35\u0410\u043d\u0430\u043b\u0438\u0437 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2024-7965\n\u041f\u0440\u043e\u0430\u043d\u0430\u043b\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043b\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u0440\u0438\u0432\u043b\u0435\u043a\u043b\u0430 \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u0435 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u043f\u043e \u0432\u0441\u0435\u043c\u0443 \u043c\u0438\u0440\u0443. \n\n\ud83d\udd35\u042d\u0432\u043e\u043b\u044e\u0446\u0438\u044f \u0430\u0442\u0430\u043a \u043d\u0430 \u0432\u0435\u0431-\u0440\u0435\u0441\u0443\u0440\u0441\u044b: \u0447\u0442\u043e \u043f\u043e\u043c\u0435\u043d\u044f\u043b\u043e\u0441\u044c \u0441 2011 \u0433\u043e\u0434\u0430\n\u0412 \u044d\u0442\u043e\u0439 \u0441\u0442\u0430\u0442\u044c\u0435 \u0440\u0430\u0441\u0441\u043a\u0430\u0437\u044b\u0432\u0430\u0435\u043c, \u043a\u0430\u043a \u0440\u0430\u0437\u0432\u0438\u0432\u0430\u043b\u0438\u0441\u044c \u043c\u0435\u0442\u043e\u0434\u044b \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u0432 \u0432 \u043f\u0435\u0440\u0438\u043e\u0434 \u0441 2011 \u043f\u043e 2018 \u0433\u043e\u0434.\n\n\ud83d\udd35\u0410\u043d\u0430\u043b\u0438\u0437 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2024-38227 \u0432 Microsoft SharePoint\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0435, \u043a\u043e\u0442\u043e\u0440\u043e\u0435 \u043f\u043e\u043c\u043e\u0433\u043b\u043e \u043d\u0430\u043c \u0438\u0437\u0443\u0447\u0438\u0442\u044c Microsoft SharePoint \u0438 \u043f\u043e\u043d\u044f\u0442\u044c \u0442\u0435\u043a\u0443\u0449\u0443\u044e \u0442\u0435\u043e\u0440\u0438\u044e \u0435\u0433\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 (state-of-the-art).\n\n\ud83d\udd35Another client side: \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u044b\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 \u0433\u043b\u0430\u0437\u0430\u043c\u0438 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0435\u0433\u043e\n\u0420\u0430\u0437\u0431\u0438\u0440\u0430\u0435\u043c \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0435 \u043a\u0435\u0439\u0441\u044b, \u043a\u043e\u0433\u0434\u0430 \u0431\u0430\u0433\u0438 \u0432 \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u044b\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f\u0445 \u0432\u0435\u043b\u0438 \u043a \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u043c \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430\u043c.\n\n\u041f\u0435\u0440\u0435\u0445\u043e\u0434\u0438\u0442\u0435, \u0447\u0438\u0442\u0430\u0439\u0442\u0435 \u0438 \u043a\u043e\u043c\u043c\u0435\u043d\u0442\u0438\u0440\u0443\u0439\u0442\u0435.", "creation_timestamp": "2024-12-25T13:51:30.000000Z"}, {"uuid": "7bd6d279-f4d1-4717-af19-7bfac9f203a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "https://t.me/kasperskyb2b/1375", "content": "\u26a0\ufe0f \u0417\u0430 \u0448\u0435\u0441\u0442\u044c\u044e 0day \u0438\u0437 Patch tuesday \u043d\u0435 \u0441\u0440\u0430\u0437\u0443 \u0437\u0430\u043c\u0435\u0442\u0438\u043b\u0438 \u043a\u0440\u0430\u0439\u043d\u0435 \u043d\u0435\u043f\u0440\u0438\u044f\u0442\u043d\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u0442\u0435\u043a\u0430 TCP/IP CVE-2024-38063 \u0441 CVSS 9.8. \u0410\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0439 \u043c\u043e\u0436\u0435\u0442 \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u0442\u044c \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u0443\u044e Windows-\u0441\u0438\u0441\u0442\u0435\u043c\u0443 \u043f\u0430\u043a\u0435\u0442\u044b IPv6 \u0438 \u0434\u043e\u0431\u0438\u0442\u044c\u0441\u044f \u0438\u0441\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430. \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0432\u0448\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0437\u0430\u044f\u0432\u043b\u044f\u0435\u0442, \u0447\u0442\u043e \u0434\u0435\u0444\u0435\u043a\u0442 \u043f\u0440\u043e\u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0434\u043e \u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u043a\u0438 \u043f\u0430\u043a\u0435\u0442\u043e\u0432 \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u044b\u043c \u044d\u043a\u0440\u0430\u043d\u043e\u043c, \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u043f\u0440\u0438 \u043d\u0435\u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u0438 \u043f\u0430\u0442\u0447\u0438\u043d\u0433\u0430 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u043e\u0432\u0430\u043d\u043e \u043e\u0442\u043a\u043b\u044e\u0447\u0438\u0442\u044c IPv6. \n\n\u041c\u044b \u0431\u044b \u043f\u043e\u0431\u0435\u0436\u0430\u043b\u0438 \u043f\u0430\u0442\u0447\u0438\u0442\u044c\u0441\u044f, \u043d\u043e \u043d\u0430\u043a\u0430\u0442\u0438\u043b\u0438 \u0430\u0432\u0433\u0443\u0441\u0442\u043e\u0432\u0441\u043a\u0438\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0435\u0449\u0451 \u0432\u0447\u0435\u0440\u0430. \n\n#\u043f\u0430\u0442\u0447\u0438 #microsoft #\u043d\u043e\u0432\u043e\u0441\u0442\u0438 @\u041f2\u0422", "creation_timestamp": "2024-08-15T15:34:56.000000Z"}, {"uuid": "a93fcd2c-aca8-4bfc-b282-4c47d41d17e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "https://t.me/bizone_channel/1383", "content": "\ud83d\udd0d \u0410\u043d\u0430\u043b\u0438\u0437 CVE-2024-38063: \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u0430\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u044f\u0434\u0440\u0430 Windows\n\n\u0412\u043e \u0432\u0442\u043e\u0440\u043e\u0439 \u0432\u0442\u043e\u0440\u043d\u0438\u043a \u043a\u0430\u0436\u0434\u043e\u0433\u043e \u043c\u0435\u0441\u044f\u0446\u0430 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Microsoft \u0432\u044b\u043f\u0443\u0441\u043a\u0430\u0435\u0442 Patch Tuesday \u2014 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f \u041e\u0421 Windows, \u0432 \u043a\u043e\u0442\u043e\u0440\u043e\u043c \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u0435\u0442 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438.\n\n\u0412 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0438 \u043e\u0442 13 \u0430\u0432\u0433\u0443\u0441\u0442\u0430 2024 \u0433\u043e\u0434\u0430 \u0431\u044b\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0441\u0435\u0442\u0435\u0432\u043e\u043c \u0441\u0442\u0435\u043a\u0435, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u0441 \u043c\u0430\u043a\u0441\u0438\u043c\u0430\u043b\u044c\u043d\u044b\u043c\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438 \u043f\u0440\u0438 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u0438 \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u043f\u043e IPv6.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0431\u044b\u043b \u043f\u0440\u0438\u0441\u0432\u043e\u0435\u043d \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440 CVE-2024-38063 \u0438 \u043a\u0440\u0438\u0442\u0438\u0447\u043d\u043e\u0441\u0442\u044c 9,8 \u043f\u043e \u0448\u043a\u0430\u043b\u0435 CVSS.\n\n\u041e\u043d\u0430 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 zero-click Windows TCP/IP RCE. \u041f\u043e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043d\u0430 \u043e\u0444\u0438\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0439 \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0435 \u0432 Microsoft Security Bulletin, \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 integer underflow \u0432 \u043e\u0434\u043d\u043e\u0439 \u0438\u0437 \u0444\u0443\u043d\u043a\u0446\u0438\u0439 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430 tcpip.sys, \u043e\u0442\u0432\u0435\u0447\u0430\u044e\u0449\u0435\u0433\u043e \u0437\u0430 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0443 \u043f\u0430\u043a\u0435\u0442\u043e\u0432 IPv6.\n\n\u041d\u0430\u0448\u0438 c\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u044b \u0438\u0437 \u0433\u0440\u0443\u043f\u043f\u044b \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0440\u0435\u0448\u0438\u043b\u0438 \u0438\u0437\u0443\u0447\u0438\u0442\u044c \u044d\u0442\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u043e\u043b\u0435\u0435 \u0434\u0435\u0442\u0430\u043b\u044c\u043d\u043e \u0438 \u043f\u0440\u0438\u0441\u0442\u0443\u043f\u0438\u043b\u0438 \u043a \u0438\u0433\u0440\u0435 \u0432 Patch Tuesday \u2014 Exploit Wednesday. \u0418 \u0432\u044b\u0438\u0433\u0440\u0430\u043b\u0438 \u0442\u043e\u043b\u044c\u043a\u043e \u0447\u0435\u0440\u0435\u0437 2 \u043d\u0435\u0434\u0435\u043b\u0438.\n\n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u0435\u0435 \u043e \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0430\u0445 \u0447\u0438\u0442\u0430\u0439\u0442\u0435 \u0432 \u0441\u0442\u0430\u0442\u044c\u0435.", "creation_timestamp": "2024-08-28T15:56:04.000000Z"}, {"uuid": "499d9dae-d20d-4aad-a96c-72bca82506f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/2410", "content": "\ud83d\udca1CVE-2024-38063 - Mitigation Script by Disabling IPV6 on All Interfaces\n\nhttps://darkwebinformer.com/cve-2024-38063-mitigation-script-by-disabling-ipv6-on-all-interfaces/", "creation_timestamp": "2024-08-16T01:00:10.000000Z"}, {"uuid": "ab99656d-8d1c-49b5-bacf-f2189d4f8861", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/RedTeamArea/511", "content": "https://malwaretech.com/2024/08/exploiting-CVE-2024-38063.html", "creation_timestamp": "2024-08-28T09:35:01.000000Z"}, {"uuid": "ed7b216d-f274-4e8b-b777-6b6b6a8541f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "https://t.me/CyberBulletin/405", "content": "\u26a1\ufe0fMicrosoft Windows Is Hacked : Zero Click Vulnerability Found in all versions. CVE-2024-38063.\n\n#CyberBulletin", "creation_timestamp": "2024-08-16T16:53:00.000000Z"}, {"uuid": "ed6de141-186d-498e-8a88-93337891e95d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "https://t.me/CyberBulletin/382", "content": "Windows TCP/IP Vulnerability CVE-2024-38063: Researchers Hold Back Exploit Details Due to High Risk.\n\n#CyberBulletin", "creation_timestamp": "2024-08-15T12:30:22.000000Z"}, {"uuid": "15fe3a34-2f93-4485-a73e-9b0846aabde7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/BlackHat0Hackers/3201", "content": "https://malwaretech.com/2024/08/exploiting-CVE-2024-38063.html", "creation_timestamp": "2024-09-02T01:00:30.000000Z"}, {"uuid": "c6bb8f13-175d-4083-8581-385beb8b1e8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "https://t.me/Kelvinseccommunity/743", "content": "\ud83d\udc6e\u200d\u2640\ufe0f Zero-click \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0432\u043e \u0432\u0441\u0435\u0445 \u0432\u0435\u0440\u0441\u0438\u044f\u0445 Windows | \u041f\u0440\u0438\u0432\u0435\u0442, \u0434\u0440\u0443\u0433. \u041d\u0430 \u0441\u0432\u044f\u0437\u0438 \u042d\u043b\u043b\u0438\u043e\u0442.\n\nMicrosoft \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0434\u0438\u043b\u0430 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u043e \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 TCP/IP, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043a\u043e\u0434\u0430 (RCE) \u043d\u0430 \u0432\u0441\u0435\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 Windows \u0441 \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u043d\u044b\u043c \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u043e\u043c IPv6.\n\n\u2014 \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2024-38063 (CVSS: 9.8) \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0446\u0435\u043b\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u044b\u043c \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435\u043c (Integer Underflow) \u0438 \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438 \u0434\u043b\u044f \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u0431\u0443\u0444\u0435\u0440\u0430 \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 Windows 10, Windows 11 \u0438 Windows Server.\n\n\u2757\ufe0f \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u0442\u0430\u043a\u0436\u0435 \u043e\u0442\u043c\u0435\u0442\u0438\u043b, \u0447\u0442\u043e \u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u043a\u0430 IPv6 \u0447\u0435\u0440\u0435\u0437 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0439 \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440 Windows \u043d\u0435 \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0442\u0438\u0442 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0442\u0430\u043a \u043a\u0430\u043a \u043e\u0448\u0438\u0431\u043a\u0430 \u0430\u043a\u0442\u0438\u0432\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0434\u043e \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u043f\u0430\u043a\u0435\u0442\u043e\u0432 \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u043e\u043c.\n\n#News #CVE #RCE #IPv6", "creation_timestamp": "2024-08-16T13:04:34.000000Z"}, {"uuid": "a54369e3-45b1-468c-b6ab-8adf0b0bac41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "exploited", "source": "https://t.me/ResistanceSquad/287", "content": "\u26a1\ufe0f1.7M Israeli Credit Cards for Sale on Darknet \n\nA massive database of 1.7 million Israeli credit cards listed for sale on a darknet forum. \n\nThe data includes card numbers, CVVs, IDs, and phone numbers.\n\n\ud83d\udcb3 Price: Full DB: $100,000\n\nExploited a critical vulnerability (CVE-2024-38063) in an Israeli clearing company, through a phishing campaign. \n\n#CyberBulletin", "creation_timestamp": "2024-11-29T14:40:10.000000Z"}, {"uuid": "4f3bd1b0-9b28-4638-8a5c-e62910a4272e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/826", "content": "https://github.com/ynwarcs/CVE-2024-38063", "creation_timestamp": "2024-09-07T09:55:09.000000Z"}, {"uuid": "bca0f6e9-fab8-4e66-9296-9efccd74bde7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/2703", "content": "\ud83d\udea8PoC for CVE-2024-38063 (RCE in tcpip.sys)\n\nPoC Demo can't be uploaded to X. I've added it to the link\n\nhttps://darkwebinformer.com/poc-for-cve-2024-38063-rce-in-tcpip-sys/", "creation_timestamp": "2024-08-26T22:30:51.000000Z"}, {"uuid": "dc8bd808-c878-4bbd-96a9-7fd205a1ff06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/Hunt3rkill3rs1/741", "content": "Better version", "creation_timestamp": "2024-08-19T21:06:11.000000Z"}, {"uuid": "8d1d7452-409f-47c7-b323-b9f40947cbc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "https://t.me/HackingInsights/9982", "content": "\u200aWindows TCP/IP Vulnerability CVE-2024-38063: Researchers Hold Back Exploit Details Due to High Risk\n\nhttps://securityonline.info/windows-tcp-ip-vulnerability-cve-2024-38063-researchers-halt-exploit-release-due-to-severity/", "creation_timestamp": "2024-08-15T16:00:56.000000Z"}, {"uuid": "e91a6eee-8125-4a58-8ada-f2109cb0c370", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/11493", "content": "\u200aZero-Click Windows RCE Threat: Researcher Publishes PoC Exploit for CVE-2024-38063\n\nhttps://securityonline.info/zero-click-windows-rce-threat-researcher-publishes-poc-exploit-for-cve-2024-38063/", "creation_timestamp": "2024-08-29T09:08:07.000000Z"}, {"uuid": "a8c03719-5ce3-4c5c-b522-70885b4b34dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/CasperSecurity/1740", "content": "https://x.com/cytexsmb/status/1824117620917862779\n\nMicrosoft has issued a critical alert for a critical vulnerability CVE-2024-38063 that allows attackers to execute arbitrary code on Windows 10, 11, &amp; Server systems.\n\nDisable-NetAdapterBinding -Name \"Adapter Name\" -ComponentID ms_tcpip6", "creation_timestamp": "2024-08-16T12:43:47.000000Z"}, {"uuid": "79c1db26-3228-405d-a99c-d1c6a24f678f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "Telegram/G4Ggg_BCH9pcmD2ctQEv1Rac2NjfrdmjCHX94Lke_YV3mJMt", "content": "", "creation_timestamp": "2024-08-19T22:42:03.000000Z"}, {"uuid": "6ede73d9-0425-4899-94b4-d42213376f34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "Telegram/aoSCJj7HU_Rj46UwjNu1vgIhignmIfa6UmPpZMZh6Ud7sgE", "content": "", "creation_timestamp": "2024-09-03T22:43:47.000000Z"}, {"uuid": "7013db70-8e06-4c64-b9ac-b50a250ae4f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "exploited", "source": "https://t.me/LegionServiceNews/2070", "content": "\ud83d\udcf0 Massive HYP Credit Card Database Breach: 1.7 Million Records Up for Sale  \n\nLeak Date: November 2024  \nTotal Data Volume: 1.7 million records  \nFile Type: Database  \nFile Size: Not specified  \n\n\ud83d\udea8 Organization Overview:  \nHYP, an Israeli retail company, is at the center of a significant data breach, exposing sensitive credit card information belonging to its customers. Hackers have put the entire database up for sale, claiming to sell it exclusively to one buyer. This breach demonstrates severe vulnerabilities within HYP's network security systems.\n\n\ud83c\udf0d Country: Israel  \n\ud83d\udd17 Website: hyp.co.il\n\n\ud83d\uddc2 Leak Information:  \nThe leaked data includes:  \n- Cardholder Information: Full name, ID number, phone number.  \n- Credit Card Details: Card number, expiration date, CVV, card type.  \n\n\ud83d\udc80 Terms of Sale:  \n- Full Database (1.7M records): $100,000.  \n- Sample Data (500\u20131000 records): $1 per record.  \n- The database will be sold to a single buyer to ensure exclusivity.  \n- Payment accepted in cryptocurrencies (ETH/BTC).  \n\n\ud83d\udd10 How the Data Was Acquired:  \nThe hackers exploited CVE-2024-38063, a critical vulnerability, during an email phishing campaign. By gathering IPv6 addresses from HYP's systems, they gained unauthorized access to sensitive data, resulting in the theft of the credit card database.  \n\n\ud83d\udd10 Recommendations for the Organization:  \n1. Notify affected customers and relevant authorities about the breach immediately.  \n2. Patch the exploited vulnerability and conduct a comprehensive forensic investigation.  \n3. Strengthen authentication mechanisms and improve network segmentation.  \n4. Enhance employee training to prevent phishing attacks.  \n5. Monitor for misuse of the stolen data and collaborate with cybersecurity agencies.  \n\n*\"Analyzing Leaks, Securing Tomorrow - Legion Service News\"*  \n\n#DataGuardAlert #LegionTrustFund #LegionServiceNews #Israel #Retail", "creation_timestamp": "2024-11-28T09:20:52.000000Z"}, {"uuid": "a7adc215-decd-4ed3-88f4-ebacd6e66971", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/Hunt3rkill3rs1/729", "content": "Enjoy \ud83d\ude08", "creation_timestamp": "2024-08-19T00:09:34.000000Z"}, {"uuid": "322faf87-a1c0-49b5-8d78-8c11b01843e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/tengkorakcybercrewz/19552", "content": "ed to download proof-of-concept script from github.com\n\n\n\n\nkali&gt; git clone https://github.com/ynwarcs/CVE-2024-38063.git\n\n\n\n\nNext, navigate to the new directory, script.\n\n\n\n\nkali&gt; cd script\n\n\n\n\nThen, install scapy using pip3.\n\n\n\n\nkali&gt; pip3 install scapy\n\n\n\n\nStep 2: Prepare the Script\n\n\n\n\nOpen the script and modify the following fields:\n\n\n\n\n* \niface: Specify the network interface to use (e.g., \"eth0\" or \"wlan0\" on Linux).\n\n* \nip_addr: Set the IPv6 address of the target system.\n\n* \nnum_tries and num_batches: Adjust these to control the number of packet batches sent.\n\n* \nmac_addr: Leave empty unless Scapy can&apos;t find the MAC address automatically.\n\n\n\n\n\nHere&apos;s an example of how your configured script might look:\n\n\n\n\niface=&apos;eth0&apos;\n\nip_addr=&apos;1234:1234:1234&apos;\n\nmac_addr=&apos;&apos;\n\nnum_tries=20\n\nnum_batches=20\n\n\n\n\nStep 3: Run the Exploit\n\n\n\n\nThe script will send multiple packets to exploit the vulnerability, including an IPv6 packet with a malformed \"destination options\" extension header. It will also send an IPv6 fragment # 1, potentially concatenated with the first packet, followed by an IPv6 fragment # 2 (with the same ID) to complete the second fragment.\n\n\n\n\nThe script attempts to trigger multiple corruptions to increase the chance of a crash. Wait for about a minute to allow \u201cIpv6pReassemblyTimeout\u201d to be triggered. As a result, the system will be disrupted.\n\n\n\n\nThe exploit will not work under all circumstances, as is the case with any exploit. \n\n\n\n\nFor troubleshooting, follow these steps: \n\n\n\n\nFirst, ensure IPv6 connectivity with \u201cping -6 {ipv6_address}\u201d from the host PC. Also, check whether your ISP supports IPv6.\n\n\n\n\nIf Scapy reports \"Mac address to reach destination not found,\" resolve MAC address issues by manually finding the target&apos;s MAC address. \n\n\n\n\nYou can use Wireshark or Scapy to obtain the MAC address and then add it to the \u201cmac_addr\u201d field in the script.\n\n\n\n\nFinally, address packet coalescing issues by modifying network adapter settings such as \"Packet Coalescing\" and \"Interrupt Moderation\".\n\n\n\n\nSummary\n\n\n\n\nCVE-2024-38063 is a serious vulnerability that affects Windows systems with IPv6 enabled. This article explains the details of a vulnerability and presents a proof of concept (PoC) that can cause a denial of service on unpatched Windows systems running IPv6. Its discovery underscores the importance of ongoing security research and the need for prompt patching. Patch your system immediately!", "creation_timestamp": "2024-09-03T22:43:46.000000Z"}, {"uuid": "0dae7fce-a5dd-4536-83d1-456d4cbaa4db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/tengkorakcybercrewz/19551", "content": "Hackers Arise Using the Brand New IPv6 Exploit to DoS a Windows System \nWelcome back, my aspiring cyberwarriors!\n\n\n\n\nRecently, security researchers discovered a critical vulnerability in the Windows IPv6 packet processing system, which was subsequently assigned the identifier CVE-2024-38063. This vulnerability can lead to a denial of service, as well as remote code execution (RCE) via specially crafted IPv6 packets. \n\n\n\n\nUnlike many vulnerabilities that require user interaction or specific software to be installed, CVE-2024-38063 can potentially be exploited remotely with no user interaction, making it particularly dangerous. In this guide, we&apos;ll delve into the technical details of CVE-2024-38063 and explore how it can be exploited.\n\n\n\n\n\n\n\nVulnerability Details\n\n\n\n\nTo understand CVE-2024-38063, we need to delve into the intricacies of how Windows handles IPv6 packets. The vulnerability arises from a complex interplay of packet processing mechanisms within the Windows TCP/IP stack.\n\n\n\n\n\n\n\nWindows employs a technique called packet coalescing, where it combines multiple IP packets for batch processing. This is generally done to improve network performance. When processing these coalesced packets, Windows first handles the extension headers for each packet before moving on to the packet data itself.\n\nDuring this process, Windows creates a linked list of packet objects. Each of these objects contains what&apos;s called a NET_BUFFER, which holds the actual packet data, along with a current-offset field. This field indicates how far the packet has been parsed.\n\n\n\n\nThe vulnerability comes into play when processing a specific type of extension header called \"destination options.\" If an error occurs while parsing this header, it triggers an error handling function. This function is supposed to \"revert\" the buffered packet data to its starting point and reset the current-offset field to zero. However, there&apos;s a crucial flaw in this process: only the first packet in the linked list gets marked as having an error.\n\n\n\n\nThis is where things get interesting. Despite this error, the system continues to parse extension headers of other packets in the list, even if they&apos;ve been \"reverted.\" As a result, the system ends up processing unexpected data. Instead of pointing to the extension headers as it should, the packet data now points to the IPv6 header. Moreover, the offset field is zero instead of its expected value (typically 0x28).\n\n\n\n\nThe real trouble starts when the system processes fragment extension headers. To calculate the length of non-header data, it subtracts a fixed value (0x30) from the current offset. But remember, our offset is now incorrectly set to zero. This subtraction causes an underflow, resulting in a very large length value.\n\nIn certain timeout scenarios, this large length value gets used in 16-bit calculations. This causes an integer overflow, which ultimately leads to a buffer overflow when copying data. It&apos;s this buffer overflow that opens the door for potential DoS and arbitrary code execution.\n\n\n\n\nExploitation Strategy\n\n\n\n\nThe exploitation strategy takes advantage of the \u201cIpv6pReceiveFragment\u201d function and involves the following steps:\n\n\n\n\n1. \nSend malformed destination options to trigger \u201cIppSendError\u201d.\n\n2. \nFollow with a fragment packet.\n\n3. \nExploit packet coalescing to reset data and offset of the second packet.\n\n4. \nCause an underflow in \u201cIpv6pReceiveFragment\u201d, creating a reassembly object with a high 16-bit fragment data length.\n\n5. \nWait for 1 minute to trigger \u201cIpv6pReassemblyTimeout\u201d.\n\n6. \nCause an integer overflow in the buffer size calculation, leading to a heap-based buffer overflow.\n\n\n\n\n\nExploitation\n\n\n\n\nFor this guide, we&apos;ll be using a Python script that implements the CVE-2024-38063 exploit developed by ynwarcs.\n\n\n\n\nStep 1: Set Up the Environment\n\n\n\n\nFirst, we ne[...]", "creation_timestamp": "2024-09-03T22:43:46.000000Z"}, {"uuid": "99c50713-0b75-4465-84ae-cbb0e766c8c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/tengkorakcybercrewz/3935", "content": "ed to download proof-of-concept script from github.com\n\n\n\n\nkali&gt; git clone https://github.com/ynwarcs/CVE-2024-38063.git\n\n\n\n\nNext, navigate to the new directory, script.\n\n\n\n\nkali&gt; cd script\n\n\n\n\nThen, install scapy using pip3.\n\n\n\n\nkali&gt; pip3 install scapy\n\n\n\n\nStep 2: Prepare the Script\n\n\n\n\nOpen the script and modify the following fields:\n\n\n\n\n* \niface: Specify the network interface to use (e.g., \"eth0\" or \"wlan0\" on Linux).\n\n* \nip_addr: Set the IPv6 address of the target system.\n\n* \nnum_tries and num_batches: Adjust these to control the number of packet batches sent.\n\n* \nmac_addr: Leave empty unless Scapy can&apos;t find the MAC address automatically.\n\n\n\n\n\nHere&apos;s an example of how your configured script might look:\n\n\n\n\niface=&apos;eth0&apos;\n\nip_addr=&apos;1234:1234:1234&apos;\n\nmac_addr=&apos;&apos;\n\nnum_tries=20\n\nnum_batches=20\n\n\n\n\nStep 3: Run the Exploit\n\n\n\n\nThe script will send multiple packets to exploit the vulnerability, including an IPv6 packet with a malformed \"destination options\" extension header. It will also send an IPv6 fragment # 1, potentially concatenated with the first packet, followed by an IPv6 fragment # 2 (with the same ID) to complete the second fragment.\n\n\n\n\nThe script attempts to trigger multiple corruptions to increase the chance of a crash. Wait for about a minute to allow \u201cIpv6pReassemblyTimeout\u201d to be triggered. As a result, the system will be disrupted.\n\n\n\n\nThe exploit will not work under all circumstances, as is the case with any exploit. \n\n\n\n\nFor troubleshooting, follow these steps: \n\n\n\n\nFirst, ensure IPv6 connectivity with \u201cping -6 {ipv6_address}\u201d from the host PC. Also, check whether your ISP supports IPv6.\n\n\n\n\nIf Scapy reports \"Mac address to reach destination not found,\" resolve MAC address issues by manually finding the target&apos;s MAC address. \n\n\n\n\nYou can use Wireshark or Scapy to obtain the MAC address and then add it to the \u201cmac_addr\u201d field in the script.\n\n\n\n\nFinally, address packet coalescing issues by modifying network adapter settings such as \"Packet Coalescing\" and \"Interrupt Moderation\".\n\n\n\n\nSummary\n\n\n\n\nCVE-2024-38063 is a serious vulnerability that affects Windows systems with IPv6 enabled. This article explains the details of a vulnerability and presents a proof of concept (PoC) that can cause a denial of service on unpatched Windows systems running IPv6. Its discovery underscores the importance of ongoing security research and the need for prompt patching. Patch your system immediately!", "creation_timestamp": "2024-09-03T22:43:46.000000Z"}, {"uuid": "2a0ceb95-2824-4402-abc1-5c8c4f5f223e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/tengkorakcybercrewz/3934", "content": "Hackers Arise Using the Brand New IPv6 Exploit to DoS a Windows System \nWelcome back, my aspiring cyberwarriors!\n\n\n\n\nRecently, security researchers discovered a critical vulnerability in the Windows IPv6 packet processing system, which was subsequently assigned the identifier CVE-2024-38063. This vulnerability can lead to a denial of service, as well as remote code execution (RCE) via specially crafted IPv6 packets. \n\n\n\n\nUnlike many vulnerabilities that require user interaction or specific software to be installed, CVE-2024-38063 can potentially be exploited remotely with no user interaction, making it particularly dangerous. In this guide, we&apos;ll delve into the technical details of CVE-2024-38063 and explore how it can be exploited.\n\n\n\n\n\n\n\nVulnerability Details\n\n\n\n\nTo understand CVE-2024-38063, we need to delve into the intricacies of how Windows handles IPv6 packets. The vulnerability arises from a complex interplay of packet processing mechanisms within the Windows TCP/IP stack.\n\n\n\n\n\n\n\nWindows employs a technique called packet coalescing, where it combines multiple IP packets for batch processing. This is generally done to improve network performance. When processing these coalesced packets, Windows first handles the extension headers for each packet before moving on to the packet data itself.\n\nDuring this process, Windows creates a linked list of packet objects. Each of these objects contains what&apos;s called a NET_BUFFER, which holds the actual packet data, along with a current-offset field. This field indicates how far the packet has been parsed.\n\n\n\n\nThe vulnerability comes into play when processing a specific type of extension header called \"destination options.\" If an error occurs while parsing this header, it triggers an error handling function. This function is supposed to \"revert\" the buffered packet data to its starting point and reset the current-offset field to zero. However, there&apos;s a crucial flaw in this process: only the first packet in the linked list gets marked as having an error.\n\n\n\n\nThis is where things get interesting. Despite this error, the system continues to parse extension headers of other packets in the list, even if they&apos;ve been \"reverted.\" As a result, the system ends up processing unexpected data. Instead of pointing to the extension headers as it should, the packet data now points to the IPv6 header. Moreover, the offset field is zero instead of its expected value (typically 0x28).\n\n\n\n\nThe real trouble starts when the system processes fragment extension headers. To calculate the length of non-header data, it subtracts a fixed value (0x30) from the current offset. But remember, our offset is now incorrectly set to zero. This subtraction causes an underflow, resulting in a very large length value.\n\nIn certain timeout scenarios, this large length value gets used in 16-bit calculations. This causes an integer overflow, which ultimately leads to a buffer overflow when copying data. It&apos;s this buffer overflow that opens the door for potential DoS and arbitrary code execution.\n\n\n\n\nExploitation Strategy\n\n\n\n\nThe exploitation strategy takes advantage of the \u201cIpv6pReceiveFragment\u201d function and involves the following steps:\n\n\n\n\n1. \nSend malformed destination options to trigger \u201cIppSendError\u201d.\n\n2. \nFollow with a fragment packet.\n\n3. \nExploit packet coalescing to reset data and offset of the second packet.\n\n4. \nCause an underflow in \u201cIpv6pReceiveFragment\u201d, creating a reassembly object with a high 16-bit fragment data length.\n\n5. \nWait for 1 minute to trigger \u201cIpv6pReassemblyTimeout\u201d.\n\n6. \nCause an integer overflow in the buffer size calculation, leading to a heap-based buffer overflow.\n\n\n\n\n\nExploitation\n\n\n\n\nFor this guide, we&apos;ll be using a Python script that implements the CVE-2024-38063 exploit developed by ynwarcs.\n\n\n\n\nStep 1: Set Up the Environment\n\n\n\n\nFirst, we ne[...]", "creation_timestamp": "2024-09-03T22:43:46.000000Z"}, {"uuid": "f398e5df-a532-46df-8102-eb833a8e6205", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/778", "content": "Tools - Hackers Factory \n\nSandman is a backdoor that is meant to work on hardened networks during red team engagements.\n\nhttps://github.com/Idov31/Sandman\n\nXSS Exploitation Tool is a penetration testing tool that focuses on the exploit of Cross-Site Scripting vulnerabilities.\n\nhttps://github.com/Sharpforce/XSS-Exploitation-Tool\n\nPOC for CVE-2024-3183 (FreeIPA Rosting)\n\nhttps://github.com/Cyxow/CVE-2024-3183-POC\n\nAbuse SVCHost Methods\n\nhttps://redteamrecipe.com/abuse-svchost-methodsrtc0017\n\n#CyberDilara\n\nSHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode.\n\nhttps://github.com/nixpal/shellsilo\n\nHacking framework This framework is designed to perform penetration testing. Its functions:\n\nScan sql vulnerability\nScan xxs vulnerability\nDos sites\nBrutforce Ftp\nBrutforse SSh\nBrutforse mail Accounts\n\nhttps://github.com/b3-v3r/Hunner\n\nShwmae\nShwmae (shuh-my) is a Windows Hello abuse tool that was released during DEF CON 32 as part of the Abusing Windows Hello Without a Severed Hand talk. The purpose of the tool is to abuse Windows Hello from a privileged user context.\n\nhttps://github.com/CCob/Shwmae\n\nThis is a (rather flaky) poc for CVE-2024-38063, a RCE in tcpip.sys patched on August 13th 2024. I didn't find and report this vuln, that would be Wei.\n\nhttps://github.com/ynwarcs/CVE-2024-38063\n\n#CyberDilara", "creation_timestamp": "2024-08-31T04:40:48.000000Z"}, {"uuid": "8fad21df-99c3-4a22-a8b2-7594b22e1f82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/767", "content": "Tools  - Hackers Factory \n\nA tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities. Presented at Black Hat USA 2024 Briefings and DEFCON 32 under the title \"Windows Downdate\n\nhttps://github.com/SafeBreach-Labs/WindowsDowndate\n\nxv0nfers/V8-sbx-bypass-collection\n\nhttps://github.com/xv0nfers/V8-sbx-bypass-collection\n\nRansomware Tool Matrix\n\nhttps://github.com/BushidoUK/Ransomware-Tool-Matrix\n\nThis repository contains a collection of Beacon Object Files (BOFs) that integrate with Cobalt Strike.\n\nhttps://github.com/Patrick0x41/BOF_All_Things\n\nThis Go program establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload.\n\nhttps://github.com/grahamhelton/USP\n\nIn the spirit of kicking a dead horse while it's down, here's a PoC for what *was* another n_gsm 0day\n\nhttps://github.com/roddux/ixode\n\nThis is a (rather flaky) poc for CVE-2024-38063, a RCE in tcpip.sys patched on August 13th 2024. I didn't find and report this vuln, that would be Wei.\n\nhttps://github.com/ynwarcs/CVE-2024-38063\n\n#CyberDilara \nhttps://t.me/CyberDilara", "creation_timestamp": "2024-08-29T05:49:15.000000Z"}, {"uuid": "60dab8f2-af04-4647-867a-eb6b1cf10dfe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/766", "content": "Tools - Hackers Factory \n\nTL-WR902AC router reverse engineering and fuzzing\n\nhttps://github.com/otsmr/blackbox-fuzzing\n\nVeilTransfer - a data exfiltration utility designed to test and enhance the detection capabilities\n\nhttps://github.com/infosecn1nja/VeilTransfer\n\nRS-Shell v0.2.0 is out! It now includes an HTTPS mode structured in server/implant/operator.\n\nHTTPS is generally more authorized in corporate network, and the new Windows implant integrates proxy detection and  authentication thanks  to WinINet.\n\nhttps://github.com/BlWasp/rs-shell\n\nNamedPipeMaster is a versatile tool for analyzing and monitoring in named pipes.\n\nhttps://github.com/zeze-zeze/NamedPipeMaster\n\nA simple Python tool to crawl a specified domain and extract URL parameters from the pages found. This tool can be useful for web scraping, SEO analysis, or understanding the structure of a website's URLs.\n\nhttps://github.com/0xgh057r3c0n/AdvCrawl\n\nInlay hints for hex-rays decompiler\n\nhttps://github.com/milankovo/hexinlay\n\nMali GPU Kernel LPE\n\nhttps://github.com/0x36/Pixel_GPU_Exploit\n\nBest research of Windows IPv6 RCE bug\n\nhttps://github.com/ynwarcs/CVE-2024-38063\n\nDiscover EmuScan: A new tool to detect devices using DMA emulation techniques.\n\nhttps://github.com/Manut0/emuscan\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-08-28T02:45:24.000000Z"}, {"uuid": "72990121-60eb-46e6-974d-070baac2afdf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "Telegram/UUBb8Gf4y_E2nIBpq5C_QjPYTDQWWE0SAsheqeKLKMFaxYI", "content": "", "creation_timestamp": "2025-01-16T16:00:10.000000Z"}, {"uuid": "9ec51e52-9215-4a61-92b2-49de5f48c04f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/23565", "content": "Tools - Hackers Factory \n\nTL-WR902AC router reverse engineering and fuzzing\n\nhttps://github.com/otsmr/blackbox-fuzzing\n\nVeilTransfer - a data exfiltration utility designed to test and enhance the detection capabilities\n\nhttps://github.com/infosecn1nja/VeilTransfer\n\nRS-Shell v0.2.0 is out! It now includes an HTTPS mode structured in server/implant/operator.\n\nHTTPS is generally more authorized in corporate network, and the new Windows implant integrates proxy detection and  authentication thanks  to WinINet.\n\nhttps://github.com/BlWasp/rs-shell\n\nNamedPipeMaster is a versatile tool for analyzing and monitoring in named pipes.\n\nhttps://github.com/zeze-zeze/NamedPipeMaster\n\nA simple Python tool to crawl a specified domain and extract URL parameters from the pages found. This tool can be useful for web scraping, SEO analysis, or understanding the structure of a website's URLs.\n\nhttps://github.com/0xgh057r3c0n/AdvCrawl\n\nInlay hints for hex-rays decompiler\n\nhttps://github.com/milankovo/hexinlay\n\nMali GPU Kernel LPE\n\nhttps://github.com/0x36/Pixel_GPU_Exploit\n\nBest research of Windows IPv6 RCE bug\n\nhttps://github.com/ynwarcs/CVE-2024-38063\n\nDiscover EmuScan: A new tool to detect devices using DMA emulation techniques.\n\nhttps://github.com/Manut0/emuscan\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-08-28T02:46:02.000000Z"}, {"uuid": "2a5b094e-e71e-4f8f-ad14-d8cab4642122", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/CipherAgents/1351668", "content": "Critical TCP/IP vulnerability #CVE-2024-38063 from August 13, 2024 has acquired its first PoC. Even though it leads to IPv6 crash via Python flask, there is already something to work on.\n\nForked it for myself just in case\n\n#icpinfo", "creation_timestamp": "2024-08-20T15:27:18.000000Z"}, {"uuid": "435d3aee-59bd-4af7-85f0-6c95e9ebc01a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "https://t.me/GrayHatsHack/8607", "content": "Windows TCP/IP Vulnerability CVE-2024-38063: Researchers Hold Back Exploit Details Due to High Risk.\n\n#CyberBulletin", "creation_timestamp": "2024-08-15T12:53:38.000000Z"}, {"uuid": "7c819083-35a1-41bb-95be-c696734940c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8681", "content": "Tools  - Hackers Factory \n\nA tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities. Presented at Black Hat USA 2024 Briefings and DEFCON 32 under the title \"Windows Downdate\n\nhttps://github.com/SafeBreach-Labs/WindowsDowndate\n\nxv0nfers/V8-sbx-bypass-collection\n\nhttps://github.com/xv0nfers/V8-sbx-bypass-collection\n\nRansomware Tool Matrix\n\nhttps://github.com/BushidoUK/Ransomware-Tool-Matrix\n\nThis repository contains a collection of Beacon Object Files (BOFs) that integrate with Cobalt Strike.\n\nhttps://github.com/Patrick0x41/BOF_All_Things\n\nThis Go program establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload.\n\nhttps://github.com/grahamhelton/USP\n\nIn the spirit of kicking a dead horse while it's down, here's a PoC for what *was* another n_gsm 0day\n\nhttps://github.com/roddux/ixode\n\nThis is a (rather flaky) poc for CVE-2024-38063, a RCE in tcpip.sys patched on August 13th 2024. I didn't find and report this vuln, that would be Wei.\n\nhttps://github.com/ynwarcs/CVE-2024-38063\n\n#CyberDilara \nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-01T17:47:14.000000Z"}, {"uuid": "338bc19c-aaa2-491e-b40f-e2b47f85cc4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "exploited", "source": "https://t.me/InfoSecInsider/25163", "content": "\u26a1\ufe0f1.7M Israeli Credit Cards for Sale on Darknet \n\nA massive database of 1.7 million Israeli credit cards listed for sale on a darknet forum. \n\nThe data includes card numbers, CVVs, IDs, and phone numbers.\n\n\ud83d\udcb3 Price: Full DB: $100,000\n\nExploited a critical vulnerability (CVE-2024-38063) in an Israeli clearing company, through a phishing campaign. \n\n#CyberBulletin", "creation_timestamp": "2024-11-29T06:26:21.000000Z"}, {"uuid": "bb1f39ad-814f-4b41-8c2d-3a9158a553ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/23587", "content": "Tools - Hackers Factory \n\nSandman is a backdoor that is meant to work on hardened networks during red team engagements.\n\nhttps://github.com/Idov31/Sandman\n\nXSS Exploitation Tool is a penetration testing tool that focuses on the exploit of Cross-Site Scripting vulnerabilities.\n\nhttps://github.com/Sharpforce/XSS-Exploitation-Tool\n\nPOC for CVE-2024-3183 (FreeIPA Rosting)\n\nhttps://github.com/Cyxow/CVE-2024-3183-POC\n\nAbuse SVCHost Methods\n\nhttps://redteamrecipe.com/abuse-svchost-methodsrtc0017\n\n#CyberDilara\n\nSHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode.\n\nhttps://github.com/nixpal/shellsilo\n\nHacking framework This framework is designed to perform penetration testing. Its functions:\n\nScan sql vulnerability\nScan xxs vulnerability\nDos sites\nBrutforce Ftp\nBrutforse SSh\nBrutforse mail Accounts\n\nhttps://github.com/b3-v3r/Hunner\n\nShwmae\nShwmae (shuh-my) is a Windows Hello abuse tool that was released during DEF CON 32 as part of the Abusing Windows Hello Without a Severed Hand talk. The purpose of the tool is to abuse Windows Hello from a privileged user context.\n\nhttps://github.com/CCob/Shwmae\n\nThis is a (rather flaky) poc for CVE-2024-38063, a RCE in tcpip.sys patched on August 13th 2024. I didn't find and report this vuln, that would be Wei.\n\nhttps://github.com/ynwarcs/CVE-2024-38063\n\n#CyberDilara", "creation_timestamp": "2024-08-31T04:41:07.000000Z"}, {"uuid": "b7223f64-498d-47b0-92d0-ebaecbc451ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/23569", "content": "Tools  - Hackers Factory \n\nA tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities. Presented at Black Hat USA 2024 Briefings and DEFCON 32 under the title \"Windows Downdate\n\nhttps://github.com/SafeBreach-Labs/WindowsDowndate\n\nxv0nfers/V8-sbx-bypass-collection\n\nhttps://github.com/xv0nfers/V8-sbx-bypass-collection\n\nRansomware Tool Matrix\n\nhttps://github.com/BushidoUK/Ransomware-Tool-Matrix\n\nThis repository contains a collection of Beacon Object Files (BOFs) that integrate with Cobalt Strike.\n\nhttps://github.com/Patrick0x41/BOF_All_Things\n\nThis Go program establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload.\n\nhttps://github.com/grahamhelton/USP\n\nIn the spirit of kicking a dead horse while it's down, here's a PoC for what *was* another n_gsm 0day\n\nhttps://github.com/roddux/ixode\n\nThis is a (rather flaky) poc for CVE-2024-38063, a RCE in tcpip.sys patched on August 13th 2024. I didn't find and report this vuln, that would be Wei.\n\nhttps://github.com/ynwarcs/CVE-2024-38063\n\n#CyberDilara \nhttps://t.me/CyberDilara", "creation_timestamp": "2024-08-29T05:49:31.000000Z"}, {"uuid": "8afe4451-52f7-4403-a0be-2f018fffc33a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3697", "content": "Tools - Hackers Factory \n\nSandman is a backdoor that is meant to work on hardened networks during red team engagements.\n\nhttps://github.com/Idov31/Sandman\n\nXSS Exploitation Tool is a penetration testing tool that focuses on the exploit of Cross-Site Scripting vulnerabilities.\n\nhttps://github.com/Sharpforce/XSS-Exploitation-Tool\n\nPOC for CVE-2024-3183 (FreeIPA Rosting)\n\nhttps://github.com/Cyxow/CVE-2024-3183-POC\n\nAbuse SVCHost Methods\n\nhttps://redteamrecipe.com/abuse-svchost-methodsrtc0017\n\n#CyberDilara\n\nSHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode.\n\nhttps://github.com/nixpal/shellsilo\n\nHacking framework This framework is designed to perform penetration testing. Its functions:\n\nScan sql vulnerability\nScan xxs vulnerability\nDos sites\nBrutforce Ftp\nBrutforse SSh\nBrutforse mail Accounts\n\nhttps://github.com/b3-v3r/Hunner\n\nShwmae\nShwmae (shuh-my) is a Windows Hello abuse tool that was released during DEF CON 32 as part of the Abusing Windows Hello Without a Severed Hand talk. The purpose of the tool is to abuse Windows Hello from a privileged user context.\n\nhttps://github.com/CCob/Shwmae\n\nThis is a (rather flaky) poc for CVE-2024-38063, a RCE in tcpip.sys patched on August 13th 2024. I didn't find and report this vuln, that would be Wei.\n\nhttps://github.com/ynwarcs/CVE-2024-38063\n\n#CyberDilara", "creation_timestamp": "2024-08-31T04:41:57.000000Z"}, {"uuid": "c277458c-645e-41c9-91f7-e51834bb8551", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3695", "content": "Tools  - Hackers Factory \n\nA tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities. Presented at Black Hat USA 2024 Briefings and DEFCON 32 under the title \"Windows Downdate\n\nhttps://github.com/SafeBreach-Labs/WindowsDowndate\n\nxv0nfers/V8-sbx-bypass-collection\n\nhttps://github.com/xv0nfers/V8-sbx-bypass-collection\n\nRansomware Tool Matrix\n\nhttps://github.com/BushidoUK/Ransomware-Tool-Matrix\n\nThis repository contains a collection of Beacon Object Files (BOFs) that integrate with Cobalt Strike.\n\nhttps://github.com/Patrick0x41/BOF_All_Things\n\nThis Go program establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload.\n\nhttps://github.com/grahamhelton/USP\n\nIn the spirit of kicking a dead horse while it's down, here's a PoC for what *was* another n_gsm 0day\n\nhttps://github.com/roddux/ixode\n\nThis is a (rather flaky) poc for CVE-2024-38063, a RCE in tcpip.sys patched on August 13th 2024. I didn't find and report this vuln, that would be Wei.\n\nhttps://github.com/ynwarcs/CVE-2024-38063\n\n#CyberDilara \nhttps://t.me/CyberDilara", "creation_timestamp": "2024-08-29T05:49:25.000000Z"}, {"uuid": "18493c6e-65fa-4ab6-833f-754e5f8e0e8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "https://t.me/true_secator/6095", "content": "Microsoft \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u0435\u0442 \u043e \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e\u0441\u0442\u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f Zero-click TCP/IP RCE, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0432\u043b\u0438\u044f\u0435\u0442 \u043d\u0430 \u0432\u0441\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Windows \u0441 \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u043d\u044b\u043c \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e IPv6 \u0438 \u0438\u043c\u0435\u0435\u0442 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u043d\u0443\u044e \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e\u0441\u0442\u044c \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438.\n\nCVE-2024-38063 \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0421\u044f\u043e\u0412\u044d\u0435\u043c\u00a0\u0438\u0437 Kunlun Lab \u0438 \u0432\u044b\u0437\u0432\u0430\u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u044e Integer Underflow, \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0434\u043b\u044f \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u0431\u0443\u0444\u0435\u0440\u0430 \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u0432 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 Windows 10, Windows 11 \u0438 Windows Server.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u043d\u0435 \u043d\u0430\u043c\u0435\u0440\u0435\u043d \u0440\u0430\u0441\u043a\u0440\u044b\u0432\u0430\u0442\u044c \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u0432 \u043a\u0440\u0430\u0442\u043a\u043e\u0441\u0440\u043e\u0447\u043d\u043e\u0439 \u043f\u0435\u0440\u0441\u043f\u0435\u043a\u0442\u0438\u0432\u0435, \u0443\u0447\u0438\u0442\u044b\u0432\u0430\u044f \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0439 \u0443\u0449\u0435\u0440\u0431, \u0434\u043e\u0431\u0430\u0432\u0438\u0432, \u0447\u0442\u043e \u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u043a\u0430 IPv6 \u043d\u0430 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u043c \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u0435 Windows \u043d\u0435 \u0437\u0430\u0431\u043b\u043e\u043a\u0438\u0440\u0443\u0435\u0442 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u044b, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0430\u043a\u0442\u0438\u0432\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0434\u043e \u0435\u0435 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u043e\u043c.\n\n\u041a\u0430\u043a \u043f\u043e\u044f\u0441\u043d\u0438\u043b\u0430 Microsoft, \u043d\u0435\u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043c\u043e\u0433\u0443\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0432\u043e\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u044e \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 \u043d\u0438\u0437\u043a\u043e\u0439 \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u0438, \u043c\u043d\u043e\u0433\u043e\u043a\u0440\u0430\u0442\u043d\u043e \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u044f \u043f\u0430\u043a\u0435\u0442\u044b IPv6, \u0432\u043a\u043b\u044e\u0447\u0430\u044e\u0449\u0438\u0435 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u044b\u0435 \u043f\u0430\u043a\u0435\u0442\u044b.\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0442\u0430\u043a\u0436\u0435 \u043e\u0442\u043c\u0435\u0442\u0438\u043b\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u0435\u0442\u043a\u043e\u0439 \u00ab\u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0431\u043e\u043b\u0435\u0435 \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u0430\u00bb.\n\n\u0411\u043e\u043b\u0435\u0435 \u0442\u043e\u0433\u043e, Microsoft \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e \u043e \u043f\u0440\u043e\u0448\u043b\u044b\u0445 \u0441\u043b\u0443\u0447\u0430\u044f\u0445 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u044d\u0442\u043e\u0433\u043e \u0442\u0438\u043f\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0447\u0442\u043e \u0434\u0435\u043b\u0430\u0435\u0442 \u0435\u0435 \u043f\u0440\u0438\u0432\u043b\u0435\u043a\u0430\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u0446\u0435\u043b\u044c\u044e \u0434\u043b\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u0432.\n\n\u0412 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043c\u0435\u0440\u044b \u0441\u043c\u044f\u0433\u0447\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0442\u0435\u0445, \u043a\u0442\u043e \u043d\u0435 \u043c\u043e\u0436\u0435\u0442 \u043d\u0435\u043c\u0435\u0434\u043b\u0435\u043d\u043d\u043e \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 Windows, Microsoft \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442 \u043e\u0442\u043a\u043b\u044e\u0447\u0438\u0442\u044c IPv6, \u0447\u0442\u043e\u0431\u044b \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u0442\u044c \u043f\u043e\u0432\u0435\u0440\u0445\u043d\u043e\u0441\u0442\u044c \u0430\u0442\u0430\u043a\u0438.\u00a0\n\n\u041e\u0434\u043d\u0430\u043a\u043e \u0441\u0442\u0435\u043a \u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u043e\u0432 IPv6 \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043e\u0431\u044f\u0437\u0430\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u0447\u0430\u0441\u0442\u044c\u044e Windows Vista \u0438 Windows Server 2008 \u0438 \u0431\u043e\u043b\u0435\u0435 \u043d\u043e\u0432\u044b\u0445 \u0432\u0435\u0440\u0441\u0438\u0439, \u0438 \u043d\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442 \u043e\u0442\u043a\u043b\u044e\u0447\u0430\u0442\u044c IPv6, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u044d\u0442\u043e \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043f\u0440\u0435\u043a\u0440\u0430\u0449\u0435\u043d\u0438\u044e \u0440\u0430\u0431\u043e\u0442\u044b \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u043e\u0432 Windows.\n\n\u0412 ZDI Trend Micro \u0442\u0430\u043a\u0436\u0435 \u043d\u0430\u0437\u0432\u0430\u043b\u0438 CVE-2024-38063 \u043e\u0434\u043d\u043e\u0439 \u0438\u0437 \u0441\u0430\u043c\u044b\u0445 \u0441\u0435\u0440\u044c\u0451\u0437\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0445 Microsoft \u0432 \u043c\u0435\u0441\u044f\u0447\u043d\u043e\u043c \u043f\u0430\u0442\u0447\u0435, \u043e\u0442\u043c\u0435\u0442\u0438\u0432 \u0435\u0451 \u043a\u0430\u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0441\u043f\u043e\u0441\u043e\u0431\u043d\u0443\u044e \u0441\u0442\u0430\u0442\u044c \u0447\u0435\u0440\u0432\u0435\u043c.\n\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u044d\u0442\u043e \u0443\u0436\u0435 \u043d\u0435 \u043f\u0435\u0440\u0432\u0430\u044f \u0438, \u0441\u043a\u043e\u0440\u0435\u0435 \u0432\u0441\u0435\u0433\u043e, \u043d\u0435 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u044f\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c Windows, \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u043c\u043e\u0436\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u043f\u0430\u043a\u0435\u0442\u043e\u0432 IPv6.\n\n\u0417\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 \u0447\u0435\u0442\u044b\u0440\u0435 \u0433\u043e\u0434\u0430 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Microsoft \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u0434\u0440\u0443\u0433\u0438\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b IPv6, \u0432\u043a\u043b\u044e\u0447\u0430\u044f CVE-2020-16898/9 (Ping of Death), \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0434\u043b\u044f RCE \u0438 \u0430\u0442\u0430\u043a \u0442\u0438\u043f\u0430 DoS \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u043f\u0430\u043a\u0435\u0442\u043e\u0432 \u043e\u0431\u044a\u044f\u0432\u043b\u0435\u043d\u0438\u0439 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u0430 ICMPv6.\n\n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u043e\u0448\u0438\u0431\u043a\u0430 \u0444\u0440\u0430\u0433\u043c\u0435\u043d\u0442\u0430\u0446\u0438\u0438 IPv6 (CVE-2021-24086) \u0441\u0434\u0435\u043b\u0430\u043b\u0430 \u0432\u0441\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 Windows \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u043c\u0438 \u0434\u043b\u044f DoS-\u0430\u0442\u0430\u043a, \u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c DHCPv6 (CVE-2023-28231) - \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u043c \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u0435 RCE \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u0437\u043e\u0432\u0430.\n\n\u041d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u0442\u043e, \u0447\u0442\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043f\u043e\u043a\u0430 \u043d\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u0438\u0445 \u0432 \u0448\u0438\u0440\u043e\u043a\u043e\u043c\u0430\u0441\u0448\u0442\u0430\u0431\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445, \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043d\u044b\u0445 \u043d\u0430 \u0432\u0441\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 Windows \u0441 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u043e\u0439 IPv6, \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043d\u0435\u043c\u0435\u0434\u043b\u0435\u043d\u043d\u043e \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f.", "creation_timestamp": "2024-08-15T10:18:55.000000Z"}, {"uuid": "83ae41b9-a9d0-4f43-b143-ac84144a2f52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "Telegram/LfogUMBxGpVn17H6Uo0yXtk68arkJ9YyItezZVoolePyzdw", "content": "", "creation_timestamp": "2024-08-24T19:32:31.000000Z"}, {"uuid": "e8314c6d-f026-4950-8cc2-4e4ac7b00abb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2249", "content": "CVE-2024-38063 (RCE in tcpip.sys) \n*\nPOC exploit", "creation_timestamp": "2024-08-28T11:52:07.000000Z"}, {"uuid": "0b457d5d-89ba-4d29-b6be-1651cd3f096a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "https://t.me/proxy_bar/2232", "content": "\u0421\u0432\u044f\u0442\u043e \u043c\u0435\u0441\u0442\u043e ipV6 \u043f\u0443\u0441\u0442\u043e \u043d\u0435 \u0431\u044b\u0432\u0430\u0435\u0442\n*\n\u0413\u0440\u043e\u043c\u043a\u0438\u0435 \u0434\u044b\u0440\u044b, \u0442\u0430\u043a\u0438\u0435 \u043a\u0430\u043a CVE-2024-38063 \u0440\u043e\u0436\u0430\u044e\u0442 \u0444\u044d\u0439\u043a\u043e\u0432\u044b\u0435 \u0441\u043f\u043b\u043e\u0438\u0442\u044b.\n*\n\u041f\u0440\u043e \u043f\u0435\u0441\u043e\u0447\u043d\u0438\u0446\u044b \u0433\u043e\u0432\u043e\u0440\u0438\u0442\u044c \u043d\u0443\u0436\u043d\u043e ? \n\u0410 \u0435\u0449\u0435 \u043c\u043d\u0435 \u043d\u0440\u0430\u0432\u0438\u0442\u0441\u044f \u0441\u043b\u043e\u0432\u043e DEMO \u0438 \u0433\u043b\u0430\u0432\u043d\u043e\u0435 \u0444\u043e\u0440\u043a\u043e\u0432 \u0441\u0434\u0435\u043b\u0430\u043b\u0438, \u0434\u0430\u0436\u0435 issue \u043e\u0442\u043a\u0440\u044b\u043b\u0438, \u043a\u0442\u043e \u0431\u0430\u0433 \u0440\u0435\u043f\u043e\u0440\u0442 \u043d\u0430\u043f\u0438\u0441\u0430\u043b \u043d\u0430 \u0442\u0440\u043e\u044f\u043d )) \ud83d\ude02\n\n#TCP\u043c\u043e\u0451Ip", "creation_timestamp": "2024-08-18T07:47:15.000000Z"}, {"uuid": "d94241a9-f8ce-478c-8128-ba745e467960", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3694", "content": "Tools - Hackers Factory \n\nTL-WR902AC router reverse engineering and fuzzing\n\nhttps://github.com/otsmr/blackbox-fuzzing\n\nVeilTransfer - a data exfiltration utility designed to test and enhance the detection capabilities\n\nhttps://github.com/infosecn1nja/VeilTransfer\n\nRS-Shell v0.2.0 is out! It now includes an HTTPS mode structured in server/implant/operator.\n\nHTTPS is generally more authorized in corporate network, and the new Windows implant integrates proxy detection and\u00a0 authentication thanks\u00a0 to WinINet.\n\nhttps://github.com/BlWasp/rs-shell\n\nNamedPipeMaster is a versatile tool for analyzing and monitoring in named pipes.\n\nhttps://github.com/zeze-zeze/NamedPipeMaster\n\nA simple Python tool to crawl a specified domain and extract URL parameters from the pages found. This tool can be useful for web scraping, SEO analysis, or understanding the structure of a website's URLs.\n\nhttps://github.com/0xgh057r3c0n/AdvCrawl\n\nInlay hints for hex-rays decompiler\n\nhttps://github.com/milankovo/hexinlay\n\nMali GPU Kernel LPE\n\nhttps://github.com/0x36/Pixel_GPU_Exploit\n\nBest research of Windows IPv6 RCE bug\n\nhttps://github.com/ynwarcs/CVE-2024-38063\n\nDiscover EmuScan: A new tool to detect devices using DMA emulation techniques.\n\nhttps://github.com/Manut0/emuscan\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-08-29T04:55:33.000000Z"}, {"uuid": "7069d977-146f-4e93-8e24-42259e579982", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "Telegram/I810afJlCUFSOOBEgk_T7ouG9e29uS6FWcZMe9NKzPPUe9s", "content": "", "creation_timestamp": "2024-08-20T20:54:30.000000Z"}, {"uuid": "a7de01d5-0eea-4eeb-9f61-fc26720525ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "Telegram/a2SfWVXkpZsmquNwDS-OTcM5v5Ial1IqH8QQ8-bePzVk5qQ", "content": "", "creation_timestamp": "2024-08-20T20:53:16.000000Z"}, {"uuid": "fb464dab-b1e1-440c-bf73-03ebdbfc213c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "Telegram/lKnXSZsRvSulrQqlmCvlRLLV9aLSb8jM9jyeeV-fGjrfpgE", "content": "", "creation_timestamp": "2024-08-15T20:33:33.000000Z"}, {"uuid": "c75db345-5085-459b-8d71-ea85a3a8246b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "Telegram/w-rgdVUxI9nxJfYz056gQJg_bWHFAINKBJNrrODfpsSfLiip", "content": "", "creation_timestamp": "2024-09-03T15:48:39.000000Z"}, {"uuid": "128d4863-a1ca-4644-9013-9b0ec9fbd7c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "Telegram/Crqf5erfjduElhilwSpGndEZVpSMZ8JX2LCExYD7M-tkzTz6", "content": "", "creation_timestamp": "2024-09-03T15:45:29.000000Z"}, {"uuid": "6b9d388e-8411-4b61-8b4c-8ebc83f50618", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "Telegram/ZqpsS7L8biW5IRFwiv8fkJx0QwP2BXLVa2A8fAxVV6l8lI8E", "content": "", "creation_timestamp": "2024-09-03T14:00:30.000000Z"}, {"uuid": "92c41fd4-ce58-46f9-b9f5-a8f035da5348", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "Telegram/X64D5PiHMrv98cXWSoBmnAowm6umMsqddOIGVK8ND60B_-f-", "content": "", "creation_timestamp": "2024-09-03T12:57:25.000000Z"}, {"uuid": "13589a2e-60ab-444a-b0e0-e4a394b799da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7356", "content": "Tools - Hackers Factory \n\nSandman is a backdoor that is meant to work on hardened networks during red team engagements.\n\nhttps://github.com/Idov31/Sandman\n\nXSS Exploitation Tool is a penetration testing tool that focuses on the exploit of Cross-Site Scripting vulnerabilities.\n\nhttps://github.com/Sharpforce/XSS-Exploitation-Tool\n\nPOC for CVE-2024-3183 (FreeIPA Rosting)\n\nhttps://github.com/Cyxow/CVE-2024-3183-POC\n\nAbuse SVCHost Methods\n\nhttps://redteamrecipe.com/abuse-svchost-methodsrtc0017\n\n#CyberDilara\n\nSHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode.\n\nhttps://github.com/nixpal/shellsilo\n\nHacking framework This framework is designed to perform penetration testing. Its functions:\n\nScan sql vulnerability\nScan xxs vulnerability\nDos sites\nBrutforce Ftp\nBrutforse SSh\nBrutforse mail Accounts\n\nhttps://github.com/b3-v3r/Hunner\n\nShwmae\nShwmae (shuh-my) is a Windows Hello abuse tool that was released during DEF CON 32 as part of the Abusing Windows Hello Without a Severed Hand talk. The purpose of the tool is to abuse Windows Hello from a privileged user context.\n\nhttps://github.com/CCob/Shwmae\n\nThis is a (rather flaky) poc for CVE-2024-38063, a RCE in tcpip.sys patched on August 13th 2024. I didn't find and report this vuln, that would be Wei.\n\nhttps://github.com/ynwarcs/CVE-2024-38063\n\n#CyberDilara", "creation_timestamp": "2024-08-31T16:28:25.000000Z"}, {"uuid": "4597c400-2c75-40da-8a3c-923f359452cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7353", "content": "Tools  - Hackers Factory \n\nA tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities. Presented at Black Hat USA 2024 Briefings and DEFCON 32 under the title \"Windows Downdate\n\nhttps://github.com/SafeBreach-Labs/WindowsDowndate\n\nxv0nfers/V8-sbx-bypass-collection\n\nhttps://github.com/xv0nfers/V8-sbx-bypass-collection\n\nRansomware Tool Matrix\n\nhttps://github.com/BushidoUK/Ransomware-Tool-Matrix\n\nThis repository contains a collection of Beacon Object Files (BOFs) that integrate with Cobalt Strike.\n\nhttps://github.com/Patrick0x41/BOF_All_Things\n\nThis Go program establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload.\n\nhttps://github.com/grahamhelton/USP\n\nIn the spirit of kicking a dead horse while it's down, here's a PoC for what *was* another n_gsm 0day\n\nhttps://github.com/roddux/ixode\n\nThis is a (rather flaky) poc for CVE-2024-38063, a RCE in tcpip.sys patched on August 13th 2024. I didn't find and report this vuln, that would be Wei.\n\nhttps://github.com/ynwarcs/CVE-2024-38063\n\n#CyberDilara \nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-01T17:47:14.000000Z"}, {"uuid": "1ad24113-79a2-4001-8951-536ade443615", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "https://t.me/GrayHatsHack/7285", "content": "Windows TCP/IP Vulnerability CVE-2024-38063: Researchers Hold Back Exploit Details Due to High Risk.\n\n#CyberBulletin", "creation_timestamp": "2024-08-15T12:53:38.000000Z"}, {"uuid": "c31d3402-1b77-4d17-829a-23354839a166", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "https://t.me/CyberSecurityIL/54292", "content": "\u26d4\u05e9\u05d9\u05de\u05d5 \u05dc\u05d1 - \u05d1\u05e2\u05d3\u05db\u05d5\u05df \u05d0\u05d1\u05d8\u05d7\u05d4 \u05d4\u05e9\u05d1\u05d5\u05e2\u05d9 \u05e9\u05dc \u05de\u05d9\u05d9\u05e7\u05e8\u05d5\u05e1\u05d5\u05e4\u05d8 \u05d9\u05e6\u05d0 \u05ea\u05d9\u05e7\u05d5\u05df \u05dc\u05d7\u05d5\u05dc\u05e9\u05d4 \u05e7\u05e8\u05d9\u05d8\u05d9\u05ea \u05d4\u05de\u05d0\u05e4\u05e9\u05e8\u05ea \u05dc\u05ea\u05d5\u05e7\u05e3 \u05dc\u05d4\u05e8\u05d9\u05e5 \u05e7\u05d5\u05d3 \u05de\u05e8\u05d7\u05d5\u05e7 \u05d0\u05dd \u05d1\u05e2\u05de\u05d3\u05d4 \u05de\u05d5\u05e4\u05e2\u05dc IPv6.\n\n\u05d4\u05d7\u05d5\u05dc\u05e9\u05d4 CVE-2024-38063 \u05de\u05d0\u05e4\u05e9\u05e8\u05ea \u05dc\u05ea\u05d5\u05e7\u05e3 \u05dc\u05d4\u05e8\u05d9\u05e5 \u05e7\u05d5\u05d3 \u05de\u05e8\u05d7\u05d5\u05e7 \u05de\u05d1\u05dc\u05d9 \u05e9\u05d4\u05de\u05e9\u05ea\u05de\u05e9 \u05d9\u05e6\u05d8\u05e8\u05da \u05dc\u05d1\u05e6\u05e2 \u05e4\u05e2\u05d5\u05dc\u05d4 \u05db\u05dc\u05e9\u05d4\u05d9 (Zero Click) \u05d5\u05d4\u05d9\u05d0 \u05e0\u05d9\u05ea\u05e0\u05ea \u05dc\u05e0\u05d9\u05e6\u05d5\u05dc \u05d1\u05db\u05dc \u05e2\u05de\u05d3\u05d4 \u05d1\u05d4 \u05de\u05d5\u05e4\u05e2\u05dc IPv6 (\u05d4\u05d0\u05e4\u05e9\u05e8\u05d5\u05ea \u05d4\u05d6\u05d5 \u05de\u05d5\u05e4\u05e2\u05dc\u05ea \u05db\u05d1\u05e8\u05d9\u05e8\u05ea \u05de\u05d7\u05d3\u05dc).\n\n\u05d7\u05e1\u05d9\u05de\u05ea IPv6 \u05d1-FW \u05d4\u05de\u05e7\u05d5\u05de\u05d9 \u05d1\u05ea\u05d7\u05e0\u05d4 \u05dc\u05d0 \u05e4\u05d5\u05ea\u05e8\u05ea \u05d0\u05ea \u05d4\u05d1\u05e2\u05d9\u05d4 \u05de\u05d0\u05d7\u05e8 \u05d5\u05d4\u05d7\u05d5\u05dc\u05e9\u05d4 \u05de\u05e0\u05d5\u05e6\u05dc\u05ea \u05dc\u05e4\u05e0\u05d9 \u05e9\u05d4\u05d1\u05e7\u05e9\u05d4 \u05e2\u05d5\u05d1\u05e8\u05ea \u05d3\u05e8\u05da \u05d4-FW.\n\n(\u05d4\u05d7\u05d5\u05dc\u05e9\u05d4 \u05d4\u05d5\u05e4\u05d9\u05e2\u05d4 \u05d1\u05e4\u05d9\u05d3 \u05d4\u05d7\u05d5\u05dc\u05e9\u05d5\u05ea \u05d4\u05e7\u05e8\u05d9\u05d8\u05d9\u05d5\u05ea \u05db\u05d1\u05e8 \u05d1-13.8)\n\nhttps://t.me/CyberSecurityIL/5612\n\n#\u05d7\u05d5\u05dc\u05e9\u05d5\u05ea", "creation_timestamp": "2024-08-15T06:11:45.000000Z"}, {"uuid": "213b69bf-29fe-4c43-b53b-b397d64af844", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "Telegram/IRSEhCbf8PwooMFK-vasEacbAZl_FhL1Z-rnMa2Zl1ldOLc", "content": "", "creation_timestamp": "2024-08-17T04:55:57.000000Z"}, {"uuid": "5e8cd05f-8304-4ab6-836a-8f6e6fb1949f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "https://t.me/CyberSecurityIL/62882", "content": "\u05ea\u05d5\u05e7\u05e3 \u05de\u05e4\u05e8\u05e1\u05dd \u05dc\u05de\u05db\u05d9\u05e8\u05d4 1.7 \u05de\u05d9\u05dc\u05d9\u05d5\u05df \u05db\u05e8\u05d8\u05d9\u05e1\u05d9 \u05d0\u05e9\u05e8\u05d0\u05d9 \u05e9\u05dc \u05d9\u05e9\u05e8\u05d0\u05dc\u05d9\u05dd \u05e9\u05d2\u05e0\u05d1 \u05dc\u05d8\u05e2\u05e0\u05ea\u05d5 \u05de\u05d7\u05d1\u05e8\u05ea \u05d4\u05e1\u05dc\u05d9\u05e7\u05d4 Hyp.\n\n\u05d4\u05de\u05d9\u05d3\u05e2 \u05de\u05d5\u05e6\u05e2 \u05dc\u05de\u05db\u05d9\u05e8\u05d4 \u05ea\u05de\u05d5\u05e8\u05ea 100,000 \u05d3\u05d5\u05dc\u05e8.\n\n\u05dc\u05d8\u05e2\u05e0\u05ea \u05d4\u05ea\u05d5\u05e7\u05e3 \u05d4\u05de\u05d9\u05d3\u05e2 \u05e0\u05d2\u05e0\u05d1 \u05dc\u05d0\u05d7\u05e8 \u05d3\u05d5\u05d0\"\u05dc \u05e4\u05d9\u05e9\u05d9\u05e0\u05d2 \u05d1\u05e9\u05d9\u05dc\u05d5\u05d1 \u05e0\u05d9\u05e6\u05d5\u05dc \u05d4\u05d7\u05d5\u05dc\u05e9\u05d4 CVE-2024-38063 \u05d1\u05e8\u05e9\u05ea \u05e9\u05dc \u05d4\u05d7\u05d1\u05e8\u05d4.\n\n\u05de\u05d6\u05db\u05d9\u05e8 \u05db\u05d9 \u05d4\u05d7\u05d5\u05d3\u05e9 \u05d3\u05d9\u05d5\u05d5\u05d7\u05d4 \u05d4\u05d7\u05d1\u05e8\u05d4 \u05e2\u05dc \u05de\u05ea\u05e7\u05e4\u05ea \u05d3\u05d9\u05d3\u05d5\u05e1 \u05e8\u05d7\u05d1\u05d4 \u05e9\u05e4\u05d2\u05e2\u05d4 \u05d1\u05e9\u05e8\u05d5\u05ea\u05d9 \u05d4\u05d7\u05d1\u05e8\u05d4 \u05dc\u05de\u05e9\u05da \u05de\u05e1\u05e4\u05e8 \u05e9\u05e2\u05d5\u05ea. \u05dc\u05d0 \u05d1\u05e8\u05d5\u05e8 \u05d0\u05dd \u05d9\u05e9 \u05e7\u05e9\u05e8 \u05d1\u05d9\u05df \u05d4\u05d0\u05d9\u05e8\u05d5\u05e2\u05d9\u05dd.\n\nhttps://t.me/CyberSecurityIL/6127\n\n#\u05d9\u05e9\u05e8\u05d0\u05dc #\u05e4\u05d9\u05e0\u05e0\u05e1\u05d9 #\u05d3\u05dc\u05e3_\u05de\u05d9\u05d3\u05e2", "creation_timestamp": "2024-11-27T21:56:03.000000Z"}, {"uuid": "2345a176-473e-4935-8df8-81ab9bb262ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/reverse_dungeon/3752", "content": "https://github.com/ynwarcs/CVE-2024-38063", "creation_timestamp": "2024-08-30T22:41:30.000000Z"}, {"uuid": "88c57d1b-9dce-4779-afc2-95b34f3b66a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/true_secator/6146", "content": "\u0412\u043a\u0440\u0430\u0442\u0446\u0435 \u043f\u043e \u0434\u0440\u0443\u0433\u0438\u043c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c \u043a\u0430\u0440\u0442\u0438\u043d\u0430 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0430\u044f.\n\n\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2024-6386 (CVSS: 9,9) \u0432 \u043f\u043b\u0430\u0433\u0438\u043d\u0435 WPML \u0434\u0435\u043b\u0430\u0435\u0442 \u0441\u0430\u0439\u0442\u044b WordPress \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u043c\u0438, \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044f \u0432\u0441\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 \u043f\u043b\u0430\u0433\u0438\u043d\u0430 \u0434\u043e 4.6.13, \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u043d\u043e\u0439 20 \u0430\u0432\u0433\u0443\u0441\u0442\u0430 2024 \u0433\u043e\u0434\u0430.\n\nWPML - \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0439 \u043f\u043b\u0430\u0433\u0438\u043d, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0439 \u0434\u043b\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u043c\u043d\u043e\u0433\u043e\u044f\u0437\u044b\u0447\u043d\u044b\u0445 \u0441\u0430\u0439\u0442\u043e\u0432 WordPress c \u043c\u0438\u043b\u043b\u0438\u043e\u043d\u043e\u043c \u0430\u043a\u0442\u0438\u0432\u043d\u044b\u0445 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043e\u043a.\n\n\u041e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0432\u0448\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c Stealthcopter \u043e\u0442\u043c\u0435\u0447\u0430\u0435\u0442, \u0447\u0442\u043e \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0437\u0430\u043a\u043b\u044e\u0447\u0430\u0435\u0442\u0441\u044f \u0432 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0435 \u043f\u043b\u0430\u0433\u0438\u043d\u043e\u043c \u043a\u043e\u0440\u043e\u0442\u043a\u0438\u0445 \u043a\u043e\u0434\u043e\u0432, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442\u0441\u044f \u0434\u043b\u044f \u0432\u0441\u0442\u0430\u0432\u043a\u0438 \u043a\u043e\u043d\u0442\u0435\u043d\u0442\u0430 \u043f\u043e\u0441\u0442\u043e\u0432: \u0430\u0443\u0434\u0438\u043e, \u0438\u0437\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u0438\u044f \u0438 \u0432\u0438\u0434\u0435\u043e.\n\n\u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430, \u0432\u043e\u0437\u043d\u0438\u043a\u0430\u044e\u0449\u0430\u044f \u0438\u0437-\u0437\u0430 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0438 \u043e\u0447\u0438\u0441\u0442\u043a\u0438 \u0432\u0445\u043e\u0434\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0441 \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c \u0443\u0440\u043e\u0432\u043d\u044f Contributor \u0438 \u0432\u044b\u0448\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043a\u043e\u0434 \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438\u00a0\u043d\u0430\u0448\u043b\u0438\u00a0\u0441\u043f\u043e\u0441\u043e\u0431 \u0434\u0430\u043c\u043f\u0430 \u043a\u043e\u0440\u043d\u0435\u0432\u043e\u0433\u043e \u043a\u043b\u044e\u0447\u0430 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f (\u0438\u043b\u0438 Fuse Key0) \u0434\u043b\u044f Intel SGX.\n\n\u041c\u0435\u0442\u043e\u0434 \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u0442\u043e\u043b\u044c\u043a\u043e \u043d\u0430 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0441\u0435\u0440\u0438\u044f\u0445 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u043e\u0432,\u00a0\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0443\u0436\u0435 \u043f\u0440\u0435\u043a\u0440\u0430\u0449\u0435\u043d\u0430. \n\n\u042d\u0442\u043e\u0442 \u043a\u043b\u044e\u0447 \u0442\u0435\u043f\u0435\u0440\u044c \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0434\u043b\u044f \u0438\u0437\u0432\u043b\u0435\u0447\u0435\u043d\u0438\u044f \u0438 \u0440\u0430\u0441\u0448\u0438\u0444\u0440\u043e\u0432\u043a\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 \u0438\u0437 \u0437\u0430\u0449\u0438\u0449\u0435\u043d\u043d\u043e\u0433\u043e \u0440\u0435\u0436\u0438\u043c\u0430 SGX \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043e\u0431\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0445 \u043a\u043b\u044e\u0447\u0435\u0439 Intel - \u0438\u043b\u0438 \u0434\u043b\u044f \u0440\u0430\u0437\u043c\u0435\u0449\u0435\u043d\u0438\u044f \u0434\u0430\u043d\u043d\u044b\u0445 \u0432\u043d\u0443\u0442\u0440\u0438.\n\n\u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u043e\u0431\u0443\u0441\u043b\u043e\u0432\u043b\u0435\u043d\u0430 \u043e\u0448\u0438\u0431\u043a\u043e\u0439 \u0432 \u043c\u0438\u043a\u0440\u043e\u043a\u043e\u0434\u0435 Intel. \u0412 \u0447\u0430\u0441\u0442\u043d\u043e\u0441\u0442\u0438, \u0441 \u043d\u0435\u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c\u044e \u043e\u0447\u0438\u0441\u0442\u0438\u0442\u044c \u0432\u043d\u0443\u0442\u0440\u0435\u043d\u043d\u0438\u0439 \u0431\u0443\u0444\u0435\u0440, \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u0449\u0438\u0439 \u0432\u0441\u0435 \u0437\u043d\u0430\u0447\u0435\u043d\u0438\u044f \u043f\u0440\u0435\u0434\u043e\u0445\u0440\u0430\u043d\u0438\u0442\u0435\u043b\u0435\u0439, \u0432\u043a\u043b\u044e\u0447\u0430\u044f FK0.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u041c\u0430\u0440\u043a\u0443\u0441 \u0425\u0430\u0442\u0447\u0438\u043d\u0441 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u043b \u0441\u0442\u0430\u0442\u044c\u044e\u00a0\u0432 \u043e\u0442\u043d\u043e\u0448\u0435\u043d\u0438\u0438 CVE-2024-38063 (CVSS 9,8), \u0432 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u043f\u0440\u0438\u0448\u0435\u043b \u043a \u0432\u044b\u0432\u043e\u0434\u0443, \u0447\u0442\u043e \u043d\u0430\u0434\u0435\u0436\u043d\u044b\u0445 PoC (\u043d\u0430 \u0434\u0430\u043d\u043d\u044b\u0439 \u043c\u043e\u043c\u0435\u043d\u0442) \u043d\u0435\u0442, \u0437\u0430 \u0438\u0441\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435\u043c \u044d\u0442\u043e\u0433\u043e, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0432\u044b\u0437\u044b\u0432\u0430\u0435\u0442 DoS.\n\nMobile Security Framework (MobSF) \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u043e\u043c \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0435 \u0434\u043b\u044f \u043f\u0435\u043d\u0442\u0435\u0441\u0442\u0438\u043d\u0433\u0430, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0430\u0442\u0430\u043a ZIP Slip \u0434\u043b\u044f \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435 MobSF.\n\n\u041e\u0448\u0438\u0431\u043a\u0430 \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0430 \u043e\u0446\u0435\u043d\u043a\u0443 CVSS 9,8 \u0438 \u043f\u0440\u043e\u0441\u0442\u0430 \u0432 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438.\n\nRedTeam Pentensting \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0430 \u043e\u0442\u0447\u0435\u0442 \u043f\u043e CVE-2024-43425 - \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0431\u044b\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c Moodle.\n\n\u0421\u0442\u0430\u043b \u0434\u043e\u0441\u0442\u0443\u043f\u0435\u043d PoC \u0434\u043b\u044f CVE-2024-38856, RCE \u0434\u043e \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0432 Apache OFBiz, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0439\u00a0\u0432 \u043d\u0430\u0447\u0430\u043b\u0435 \u044d\u0442\u043e\u0433\u043e \u043c\u0435\u0441\u044f\u0446\u0430.\n\n\u041e\u0448\u0438\u0431\u043a\u0430 \u0434\u043e\u0431\u0430\u0432\u043b\u0435\u043d\u0430 \u0432 \u0431\u0430\u0437\u0443 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0445 \u043e\u0448\u0438\u0431\u043e\u043a CISA KEV.\n\nMicrosoft \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0430\u0442\u0430\u043a\u0438, \u0432 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u0441\u0438\u043c\u0432\u043e\u043b\u044b ASCII \u0434\u043b\u044f \u043a\u0440\u0430\u0436\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 \u0438\u0437 Copilot AI.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u0430\u044f \u0433\u0440\u0443\u043f\u043f\u0430 Trend Micro \u0440\u0430\u0441\u043a\u0440\u044b\u0432\u0430\u0435\u0442 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 CVE-2024-37079 \u0432 VMware vCenter Server, \u043e\u043f\u0438\u0441\u044b\u0432\u0430\u044f \u043e\u0441\u043d\u043e\u0432\u043d\u0443\u044e \u043f\u0440\u0438\u0447\u0438\u043d\u0443 \u044d\u0442\u043e\u0439 \u043e\u0448\u0438\u0431\u043a\u0438 \u0438 \u043f\u043e\u043a\u0430\u0437\u044b\u0432\u0430\u044f, \u043a\u0430\u043a \u0435\u0435 \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0434\u043b\u044f RCE.\n\n\u041f\u043e\u043a\u0430 \u043d\u0435 \u0431\u044b\u043b\u043e \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043e \u043d\u0438 \u043e\u0434\u043d\u043e\u0439 \u0430\u0442\u0430\u043a\u0438 \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435, \u043f\u0440\u0438 \u044d\u0442\u043e\u043c \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u043d\u0435 \u0442\u0440\u0438\u0432\u0438\u0430\u043b\u044c\u043d\u0430.", "creation_timestamp": "2024-08-29T14:20:05.000000Z"}, {"uuid": "fcaca4e7-7802-425c-a33b-95a76119e659", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "https://t.me/ctinow/222105", "content": "Where are we with CVE-2024-38063: Microsoft IPv6 Vulnerability, (Tue, Aug 20th)\nhttps://ift.tt/1WLS3Mq", "creation_timestamp": "2024-08-20T16:59:18.000000Z"}, {"uuid": "88f87673-ea14-40d6-a880-6bee4743300f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "https://t.me/reverse_dungeon/3751", "content": "https://bi.zone/expertise/blog/analiz-kriticheskoy-uyazvimosti-windows-cve-2024-38063/?utm_source=telegram&amp;utm_medium=messenger&amp;utm_campaign=analiz-kriticheskoy-uyazvimosti-windows-cve-2024-38063=28.08.2024&amp;utm_term=bi.zone", "creation_timestamp": "2024-08-28T20:07:31.000000Z"}, {"uuid": "f15a8fb0-f28c-4c6a-bd84-8408672ec847", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/reverse_dungeon/3747", "content": "POC for trigerring CVE-2024-38063 (RCE in tcpip.sys)\n\nhttps://github.com/ynwarcs/CVE-2024-38063\n\n#expdev #poc", "creation_timestamp": "2024-08-26T17:34:02.000000Z"}, {"uuid": "13a064fd-83cd-46b0-8633-6a12d07408eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "exploited", "source": "https://t.me/SecLabNews/15520", "content": "Zero-click \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Windows \u0433\u0440\u043e\u0437\u0438\u0442 \u0430\u043f\u043e\u043a\u0430\u043b\u0438\u043f\u0441\u0438\u0441\u043e\u043c \u0433\u043b\u043e\u0431\u0430\u043b\u044c\u043d\u043e\u0439 \u0441\u0435\u0442\u0438\n\n\ud83d\udd13 \u041e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2024-38063 \u0432 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0435 IPv6 Windows. \u041e\u0448\u0438\u0431\u043a\u0430 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043a\u043e\u0434\u0430 \u043d\u0430 \u0432\u0441\u0435\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 \u0441 Windows 10, 11 \u0438 Windows Server.\n\n\ud83e\udda0 \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0438\u043c\u0435\u0435\u0442 \u0441\u0442\u0430\u0442\u0443\u0441 wormable, \u0447\u0442\u043e \u043e\u0437\u043d\u0430\u0447\u0430\u0435\u0442 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0435\u0435 \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0431\u0435\u0437 \u0443\u0447\u0430\u0441\u0442\u0438\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043e\u0442\u043b\u0438\u0447\u0430\u0435\u0442\u0441\u044f \u043d\u0438\u0437\u043a\u043e\u0439 \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u044c\u044e, \u043f\u043e\u0432\u044b\u0448\u0430\u044f \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e\u0441\u0442\u044c \u0435\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u0432 \u0430\u0442\u0430\u043a\u0430\u0445.\n\n\ud83d\udee1 Microsoft \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442 \u043d\u0435\u043c\u0435\u0434\u043b\u0435\u043d\u043d\u043e \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u0437\u0430\u0449\u0438\u0442\u044b. \u0410\u043b\u044c\u0442\u0435\u0440\u043d\u0430\u0442\u0438\u0432\u043d\u043e, \u043c\u043e\u0436\u043d\u043e \u043e\u0442\u043a\u043b\u044e\u0447\u0438\u0442\u044c IPv6, \u043d\u043e \u044d\u0442\u043e \u043c\u043e\u0436\u0435\u0442 \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u0441\u0431\u043e\u0438 \u0432 \u0440\u0430\u0431\u043e\u0442\u0435 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u043e\u0432 Windows.\n\n#\u0434\u0430\u043d\u043d\u044b\u0435\u0432\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 #Windows #ZeroDay #Security \n\n@ZerodayAlert", "creation_timestamp": "2024-08-15T12:33:01.000000Z"}, {"uuid": "0226de14-6b03-4128-8f6b-e11f30d4faca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/HackerOne/3706", "content": "https://github.com/ynwarcs/CVE-2024-38063", "creation_timestamp": "2024-09-01T20:11:06.000000Z"}, {"uuid": "6a1173fe-2fe3-40ad-8203-54fb711f2b9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/HackerOne/3716", "content": "https://malwaretech.com/2024/08/exploiting-CVE-2024-38063.html", "creation_timestamp": "2024-09-23T22:05:46.000000Z"}, {"uuid": "bed4af04-6973-4a57-8cd0-9506318d2cd7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/9074", "content": "CVE-2024-38063 - Remotely Exploiting The Kernel Via IPv6 \u2013 MalwareTech\n\nhttps://malwaretech.com/2024/08/exploiting-CVE-2024-38063.html", "creation_timestamp": "2024-08-29T11:59:39.000000Z"}, {"uuid": "da2a473a-164f-45e8-bb42-17aa4bfe732e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "exploited", "source": "https://t.me/CyberBulletin/26655", "content": "\u26a1\ufe0f1.7M Israeli Credit Cards for Sale on Darknet \n\nA massive database of 1.7 million Israeli credit cards listed for sale on a darknet forum. \n\nThe data includes card numbers, CVVs, IDs, and phone numbers.\n\n\ud83d\udcb3 Price: Full DB: $100,000\n\nExploited a critical vulnerability (CVE-2024-38063) in an Israeli clearing company, through a phishing campaign. \n\n#CyberBulletin", "creation_timestamp": "2024-11-29T06:26:03.000000Z"}, {"uuid": "4399f88b-94ad-45d2-958f-883e8c78bf3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/S_E_Reborn/5131", "content": ".NET Crash Dump Analysis\n\nML for binary diffing (\u0441\u043b\u0430\u0439\u0434\u044b)\n\nA step-by-step guide to writing an iOS kernel exploit\n\nThe Art of Fuzzing: A Deep Dive into Software Security\n\nLearning Binary Ninja for Reverse Engineering\n\nOpaque Predicates and How to Hunt Them\n\nPoC Windows kernel driver for detect DMA devices\n\nImprove Your Forensic Analyses with hashlookup\n\n\u0411\u043b\u043e\u0433\n\nWindows kernel debugger for Linux hosts running Windows under KVM/QEMU\n\nWindows Kernel Pool Exploitation CVE-2021-31956 - Part 2\n\nLinux RCU internal\n\nUnidbg to production\n\nHunting for CVE-2024-38063 by diffing Tcpip.sys with Ghidra", "creation_timestamp": "2024-09-27T10:03:26.000000Z"}, {"uuid": "41b4a9d8-1678-4685-9df7-ecbec574bccc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3028", "content": "https://github.com/Sachinart/CVE-2024-38063-POC\n\nNote: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.\n#github #poc", "creation_timestamp": "2024-08-20T14:55:03.000000Z"}, {"uuid": "7e6a6722-e937-40dc-badf-5f7b60201f45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/club31337/2728", "content": "https://github.com/ynwarcs/CVE-2024-38063\n\n#RCE in tcpip.sys\n\n@club1337", "creation_timestamp": "2024-11-11T02:56:02.000000Z"}, {"uuid": "65fa33a7-24e3-4169-bf07-b2c14b78a981", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11011", "content": "#exploit\nCVE-2024-38063:\nWindows TCP/IP RCE\nhttps://github.com/Sachinart/CVE-2024-38063-POC\n]-&gt; https://github.com/ynwarcs/CVE-2024-38063", "creation_timestamp": "2024-08-27T11:12:06.000000Z"}, {"uuid": "86639a86-233b-4e55-9070-0f73c1a86622", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11010", "content": "#tools\n#Blue_Team_Techniques\n1. ShellSweepX - ML-powered web shell detection and analysis platform\nhttps://github.com/splunk/ShellSweep/wiki/ShellSweepX\n2. CVE-2024-38063 mitigation script by disabling ipv6 of all interfaces\nhttps://github.com/diegoalbuquerque/CVE-2024-38063", "creation_timestamp": "2024-08-20T17:03:39.000000Z"}, {"uuid": "ad4c9caa-706c-4b88-bd6e-8d2ea38bd2f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "exploited", "source": "https://t.me/InfoSecInsider/825", "content": "\u26a1\ufe0f1.7M Israeli Credit Cards for Sale on Darknet \n\nA massive database of 1.7 million Israeli credit cards listed for sale on a darknet forum. \n\nThe data includes card numbers, CVVs, IDs, and phone numbers.\n\n\ud83d\udcb3 Price: Full DB: $100,000\n\nExploited a critical vulnerability (CVE-2024-38063) in an Israeli clearing company, through a phishing campaign. \n\n#CyberBulletin", "creation_timestamp": "2024-11-29T06:26:22.000000Z"}, {"uuid": "b0829c65-5e04-4038-8f5d-b2f82844c934", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/93", "content": "Tools - Hackers Factory \n\nTL-WR902AC router reverse engineering and fuzzing\n\nhttps://github.com/otsmr/blackbox-fuzzing\n\nVeilTransfer - a data exfiltration utility designed to test and enhance the detection capabilities\n\nhttps://github.com/infosecn1nja/VeilTransfer\n\nRS-Shell v0.2.0 is out! It now includes an HTTPS mode structured in server/implant/operator.\n\nHTTPS is generally more authorized in corporate network, and the new Windows implant integrates proxy detection and  authentication thanks  to WinINet.\n\nhttps://github.com/BlWasp/rs-shell\n\nNamedPipeMaster is a versatile tool for analyzing and monitoring in named pipes.\n\nhttps://github.com/zeze-zeze/NamedPipeMaster\n\nA simple Python tool to crawl a specified domain and extract URL parameters from the pages found. This tool can be useful for web scraping, SEO analysis, or understanding the structure of a website's URLs.\n\nhttps://github.com/0xgh057r3c0n/AdvCrawl\n\nInlay hints for hex-rays decompiler\n\nhttps://github.com/milankovo/hexinlay\n\nMali GPU Kernel LPE\n\nhttps://github.com/0x36/Pixel_GPU_Exploit\n\nBest research of Windows IPv6 RCE bug\n\nhttps://github.com/ynwarcs/CVE-2024-38063\n\nDiscover EmuScan: A new tool to detect devices using DMA emulation techniques.\n\nhttps://github.com/Manut0/emuscan\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-19T06:20:05.000000Z"}, {"uuid": "d27b001a-9719-4590-9e58-ab4694947927", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/97", "content": "Tools  - Hackers Factory \n\nA tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities. Presented at Black Hat USA 2024 Briefings and DEFCON 32 under the title \"Windows Downdate\n\nhttps://github.com/SafeBreach-Labs/WindowsDowndate\n\nxv0nfers/V8-sbx-bypass-collection\n\nhttps://github.com/xv0nfers/V8-sbx-bypass-collection\n\nRansomware Tool Matrix\n\nhttps://github.com/BushidoUK/Ransomware-Tool-Matrix\n\nThis repository contains a collection of Beacon Object Files (BOFs) that integrate with Cobalt Strike.\n\nhttps://github.com/Patrick0x41/BOF_All_Things\n\nThis Go program establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload.\n\nhttps://github.com/grahamhelton/USP\n\nIn the spirit of kicking a dead horse while it's down, here's a PoC for what *was* another n_gsm 0day\n\nhttps://github.com/roddux/ixode\n\nThis is a (rather flaky) poc for CVE-2024-38063, a RCE in tcpip.sys patched on August 13th 2024. I didn't find and report this vuln, that would be Wei.\n\nhttps://github.com/ynwarcs/CVE-2024-38063\n\n#CyberDilara \nhttps://t.me/CyberDilara", "creation_timestamp": "2024-08-29T05:49:31.000000Z"}, {"uuid": "a6919143-f1bb-42de-9cb9-232f98a240ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/112", "content": "Tools - Hackers Factory \n\nSandman is a backdoor that is meant to work on hardened networks during red team engagements.\n\nhttps://github.com/Idov31/Sandman\n\nXSS Exploitation Tool is a penetration testing tool that focuses on the exploit of Cross-Site Scripting vulnerabilities.\n\nhttps://github.com/Sharpforce/XSS-Exploitation-Tool\n\nPOC for CVE-2024-3183 (FreeIPA Rosting)\n\nhttps://github.com/Cyxow/CVE-2024-3183-POC\n\nAbuse SVCHost Methods\n\nhttps://redteamrecipe.com/abuse-svchost-methodsrtc0017\n\n#CyberDilara\n\nSHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode.\n\nhttps://github.com/nixpal/shellsilo\n\nHacking framework This framework is designed to perform penetration testing. Its functions:\n\nScan sql vulnerability\nScan xxs vulnerability\nDos sites\nBrutforce Ftp\nBrutforse SSh\nBrutforse mail Accounts\n\nhttps://github.com/b3-v3r/Hunner\n\nShwmae\nShwmae (shuh-my) is a Windows Hello abuse tool that was released during DEF CON 32 as part of the Abusing Windows Hello Without a Severed Hand talk. The purpose of the tool is to abuse Windows Hello from a privileged user context.\n\nhttps://github.com/CCob/Shwmae\n\nThis is a (rather flaky) poc for CVE-2024-38063, a RCE in tcpip.sys patched on August 13th 2024. I didn't find and report this vuln, that would be Wei.\n\nhttps://github.com/ynwarcs/CVE-2024-38063\n\n#CyberDilara", "creation_timestamp": "2024-08-31T04:41:07.000000Z"}, {"uuid": "9ff2c3e2-1fc7-41e8-b1a2-459af70b3a24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "https://t.me/S_E_Reborn/5027", "content": "Microsoft \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u0435\u0442 \u043e \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e\u0441\u0442\u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f Zero-click TCP/IP RCE, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0432\u043b\u0438\u044f\u0435\u0442 \u043d\u0430 \u0432\u0441\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Windows \u0441 \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u043d\u044b\u043c \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e IPv6 \u0438 \u0438\u043c\u0435\u0435\u0442 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u043d\u0443\u044e \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e\u0441\u0442\u044c \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438.\n\nCVE-2024-38063 \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0421\u044f\u043e\u0412\u044d\u0435\u043c\u00a0\u0438\u0437 Kunlun Lab \u0438 \u0432\u044b\u0437\u0432\u0430\u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u044e Integer Underflow, \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0434\u043b\u044f \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u0431\u0443\u0444\u0435\u0440\u0430 \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u0432 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 Windows 10, Windows 11 \u0438 Windows Server.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u043d\u0435 \u043d\u0430\u043c\u0435\u0440\u0435\u043d \u0440\u0430\u0441\u043a\u0440\u044b\u0432\u0430\u0442\u044c \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u0432 \u043a\u0440\u0430\u0442\u043a\u043e\u0441\u0440\u043e\u0447\u043d\u043e\u0439 \u043f\u0435\u0440\u0441\u043f\u0435\u043a\u0442\u0438\u0432\u0435, \u0443\u0447\u0438\u0442\u044b\u0432\u0430\u044f \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0439 \u0443\u0449\u0435\u0440\u0431, \u0434\u043e\u0431\u0430\u0432\u0438\u0432, \u0447\u0442\u043e \u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u043a\u0430 IPv6 \u043d\u0430 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u043c \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u0435 Windows \u043d\u0435 \u0437\u0430\u0431\u043b\u043e\u043a\u0438\u0440\u0443\u0435\u0442 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u044b, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0430\u043a\u0442\u0438\u0432\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0434\u043e \u0435\u0435 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u043e\u043c.\n\n\u041a\u0430\u043a \u043f\u043e\u044f\u0441\u043d\u0438\u043b\u0430 Microsoft, \u043d\u0435\u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043c\u043e\u0433\u0443\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0432\u043e\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u044e \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 \u043d\u0438\u0437\u043a\u043e\u0439 \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u0438, \u043c\u043d\u043e\u0433\u043e\u043a\u0440\u0430\u0442\u043d\u043e \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u044f \u043f\u0430\u043a\u0435\u0442\u044b IPv6, \u0432\u043a\u043b\u044e\u0447\u0430\u044e\u0449\u0438\u0435 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u044b\u0435 \u043f\u0430\u043a\u0435\u0442\u044b.\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0442\u0430\u043a\u0436\u0435 \u043e\u0442\u043c\u0435\u0442\u0438\u043b\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u0435\u0442\u043a\u043e\u0439 \u00ab\u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0431\u043e\u043b\u0435\u0435 \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u0430\u00bb.\n\n\u0411\u043e\u043b\u0435\u0435 \u0442\u043e\u0433\u043e, Microsoft \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e \u043e \u043f\u0440\u043e\u0448\u043b\u044b\u0445 \u0441\u043b\u0443\u0447\u0430\u044f\u0445 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u044d\u0442\u043e\u0433\u043e \u0442\u0438\u043f\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0447\u0442\u043e \u0434\u0435\u043b\u0430\u0435\u0442 \u0435\u0435 \u043f\u0440\u0438\u0432\u043b\u0435\u043a\u0430\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u0446\u0435\u043b\u044c\u044e \u0434\u043b\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u0432.\n\n\u0412 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043c\u0435\u0440\u044b \u0441\u043c\u044f\u0433\u0447\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0442\u0435\u0445, \u043a\u0442\u043e \u043d\u0435 \u043c\u043e\u0436\u0435\u0442 \u043d\u0435\u043c\u0435\u0434\u043b\u0435\u043d\u043d\u043e \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 Windows, Microsoft \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442 \u043e\u0442\u043a\u043b\u044e\u0447\u0438\u0442\u044c IPv6, \u0447\u0442\u043e\u0431\u044b \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u0442\u044c \u043f\u043e\u0432\u0435\u0440\u0445\u043d\u043e\u0441\u0442\u044c \u0430\u0442\u0430\u043a\u0438.\u00a0\n\n\u041e\u0434\u043d\u0430\u043a\u043e \u0441\u0442\u0435\u043a \u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u043e\u0432 IPv6 \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043e\u0431\u044f\u0437\u0430\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u0447\u0430\u0441\u0442\u044c\u044e Windows Vista \u0438 Windows Server 2008 \u0438 \u0431\u043e\u043b\u0435\u0435 \u043d\u043e\u0432\u044b\u0445 \u0432\u0435\u0440\u0441\u0438\u0439, \u0438 \u043d\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442 \u043e\u0442\u043a\u043b\u044e\u0447\u0430\u0442\u044c IPv6, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u044d\u0442\u043e \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043f\u0440\u0435\u043a\u0440\u0430\u0449\u0435\u043d\u0438\u044e \u0440\u0430\u0431\u043e\u0442\u044b \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u043e\u0432 Windows.\n\n\u0412 ZDI Trend Micro \u0442\u0430\u043a\u0436\u0435 \u043d\u0430\u0437\u0432\u0430\u043b\u0438 CVE-2024-38063 \u043e\u0434\u043d\u043e\u0439 \u0438\u0437 \u0441\u0430\u043c\u044b\u0445 \u0441\u0435\u0440\u044c\u0451\u0437\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0445 Microsoft \u0432 \u043c\u0435\u0441\u044f\u0447\u043d\u043e\u043c \u043f\u0430\u0442\u0447\u0435, \u043e\u0442\u043c\u0435\u0442\u0438\u0432 \u0435\u0451 \u043a\u0430\u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0441\u043f\u043e\u0441\u043e\u0431\u043d\u0443\u044e \u0441\u0442\u0430\u0442\u044c \u0447\u0435\u0440\u0432\u0435\u043c.\n\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u044d\u0442\u043e \u0443\u0436\u0435 \u043d\u0435 \u043f\u0435\u0440\u0432\u0430\u044f \u0438, \u0441\u043a\u043e\u0440\u0435\u0435 \u0432\u0441\u0435\u0433\u043e, \u043d\u0435 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u044f\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c Windows, \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u043c\u043e\u0436\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u043f\u0430\u043a\u0435\u0442\u043e\u0432 IPv6.\n\n\u0417\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 \u0447\u0435\u0442\u044b\u0440\u0435 \u0433\u043e\u0434\u0430 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Microsoft \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u0434\u0440\u0443\u0433\u0438\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b IPv6, \u0432\u043a\u043b\u044e\u0447\u0430\u044f CVE-2020-16898/9 (Ping of Death), \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0434\u043b\u044f RCE \u0438 \u0430\u0442\u0430\u043a \u0442\u0438\u043f\u0430 DoS \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u043f\u0430\u043a\u0435\u0442\u043e\u0432 \u043e\u0431\u044a\u044f\u0432\u043b\u0435\u043d\u0438\u0439 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u0430 ICMPv6.\n\n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u043e\u0448\u0438\u0431\u043a\u0430 \u0444\u0440\u0430\u0433\u043c\u0435\u043d\u0442\u0430\u0446\u0438\u0438 IPv6 (CVE-2021-24086) \u0441\u0434\u0435\u043b\u0430\u043b\u0430 \u0432\u0441\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 Windows \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u043c\u0438 \u0434\u043b\u044f DoS-\u0430\u0442\u0430\u043a, \u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c DHCPv6 (CVE-2023-28231) - \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u043c \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u0435 RCE \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u0437\u043e\u0432\u0430.\n\n\u041d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u0442\u043e, \u0447\u0442\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043f\u043e\u043a\u0430 \u043d\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u0438\u0445 \u0432 \u0448\u0438\u0440\u043e\u043a\u043e\u043c\u0430\u0441\u0448\u0442\u0430\u0431\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445, \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043d\u044b\u0445 \u043d\u0430 \u0432\u0441\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 Windows \u0441 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u043e\u0439 IPv6, \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043d\u0435\u043c\u0435\u0434\u043b\u0435\u043d\u043d\u043e \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f.", "creation_timestamp": "2024-08-15T11:48:19.000000Z"}, {"uuid": "3f8c1aaf-cd2c-44f9-9a25-87399a2ff739", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38063", "type": "seen", "source": "https://t.me/sysodmins/22802", "content": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c TCP/IP \u0443\u0433\u0440\u043e\u0436\u0430\u0435\u0442 \u0432\u0441\u0435\u043c Windows-\u0441\u0438\u0441\u0442\u0435\u043c\u0430\u043c, \u0433\u0434\u0435 \u0432\u043a\u043b\u044e\u0447\u0435\u043d IPv6\n\nMicrosoft \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c TCP/IP, \u0434\u043e\u043f\u0443\u0441\u043a\u0430\u0432\u0448\u0443\u044e \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0432\u0441\u0435 Windows-\u0441\u0438\u0441\u0442\u0435\u043c\u044b, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0438\u0435 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b IPv6, \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u043d\u044b\u0439 \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e.\n\nCVE-2024-38063 \u043c\u043e\u0436\u0435\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0434\u043b\u044f \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u0431\u0443\u0444\u0435\u0440\u0430 \u0438 \u043f\u043e\u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0435\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 \u043f\u043e\u0434 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c Windows 10, Windows 11 \u0438 Windows Server.\n\nMicrosoft \u043e\u0442\u043c\u0435\u0442\u0438\u043b\u0430, \u0447\u0442\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u044d\u0442\u043e\u0439 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432\u0435\u0441\u044c\u043c\u0430 \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u0430, \u0442\u043e \u0435\u0441\u0442\u044c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043c\u043e\u0433\u0443\u0442 \u0441\u043e\u0437\u0434\u0430\u0442\u044c \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442 \u0434\u043b\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0430\u0442\u0430\u043a\u0430\u0445.\n\n\u0422\u0438\u043f\u0438\u0447\u043d\u044b\u0439 \ud83e\udd78 \u0421\u0438\u0441\u0430\u0434\u043c\u0438\u043d", "creation_timestamp": "2024-08-16T02:31:34.000000Z"}]}