8000 GitHub - FrancescoDiSalesGithub/quick-fix-cve-2024-38063: quick powershell script to fix cve-2024-38063
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

FrancescoDiSalesGithub/quick-fix-cve-2024-38063

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 

Repository files navigation

quick-fix-cve-2024-38063

quick powershell script to fix cve-2024-38063

Donation

if you want to support my works, you can donate me at the following monero address:

4B9WQivaHfd3miDfPKEfCianocGpBx9d8FXycz2vmNW3aBDVKHgkBd9Gmapt4RBVEpTwnehujsiUBBehUiLvnEHs7VFstCC

Or using PayPal:

https://www.paypal.me/francescodisales

How to run

Firstly on your windows system you should check for the execution policy:

Get-ExectionPolicy

If it is Unrestricted you can run the script without problems. If it isn't the case:

Set-ExectionPolicy -ExecutionPolicy Unrestricted

After that the Execution policy is unrestricted then run the script:

.\cve-2024-38063-fix.ps1

When the script has done, check on the control panel at the network adapter configuration window, and you should see the ipv6 checkbox disabled.

About

quick powershell script to fix cve-2024-38063

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases 3084 published

Packages

No packages published
0