PoC-in-GitHub/2020/CVE-2020-3452.json

278 lines
9.7 KiB
JSON
Raw Normal View History

2020-07-24 05:08:27 +02:00
[
2020-09-19 05:08:41 +02:00
{
"id": 282086490,
"name": "CVE-2020-3452-PoC",
"full_name": "XDev05\/CVE-2020-3452-PoC",
"owner": {
"login": "XDev05",
"id": 55960303,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/55960303?v=4",
"html_url": "https:\/\/github.com\/XDev05"
},
"html_url": "https:\/\/github.com\/XDev05\/CVE-2020-3452-PoC",
"description": null,
"fork": false,
"created_at": "2020-07-24T00:39:11Z",
"updated_at": "2020-09-17T04:12:51Z",
"pushed_at": "2020-07-24T00:49:40Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 282135631,
"name": "cve-2020-3452",
"full_name": "Loneyers\/cve-2020-3452",
"owner": {
"login": "Loneyers",
"id": 29177120,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/29177120?v=4",
"html_url": "https:\/\/github.com\/Loneyers"
},
"html_url": "https:\/\/github.com\/Loneyers\/cve-2020-3452",
"description": "unauth file read in cisco asa & firepower.",
"fork": false,
"created_at": "2020-07-24T05:56:32Z",
"updated_at": "2020-08-17T08:48:02Z",
"pushed_at": "2020-07-24T06:02:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 282249421,
"name": "CVE-2020-3452-Cisco-Scanner",
"full_name": "PR3R00T\/CVE-2020-3452-Cisco-Scanner",
"owner": {
"login": "PR3R00T",
"id": 50199640,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/50199640?v=4",
"html_url": "https:\/\/github.com\/PR3R00T"
},
"html_url": "https:\/\/github.com\/PR3R00T\/CVE-2020-3452-Cisco-Scanner",
"description": "CVE-2020-3452 Cisco ASA Scanner -unauth Path Traversal Check",
"fork": false,
"created_at": "2020-07-24T15:04:45Z",
2020-11-17 04:09:23 +01:00
"updated_at": "2020-11-16T23:35:54Z",
2020-09-19 05:08:41 +02:00
"pushed_at": "2020-08-30T21:34:41Z",
2020-11-17 04:09:23 +01:00
"stargazers_count": 13,
"watchers_count": 13,
2020-10-14 17:09:05 +02:00
"forks_count": 4,
"forks": 4,
2020-11-17 04:09:23 +01:00
"watchers": 13,
2020-09-19 05:08:41 +02:00
"score": 0
},
{
"id": 282267605,
"name": "CVE-2020-3452",
"full_name": "mr-r3b00t\/CVE-2020-3452",
"owner": {
"login": "mr-r3b00t",
"id": 14963690,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/14963690?v=4",
"html_url": "https:\/\/github.com\/mr-r3b00t"
},
"html_url": "https:\/\/github.com\/mr-r3b00t\/CVE-2020-3452",
"description": null,
"fork": false,
"created_at": "2020-07-24T16:26:52Z",
2020-10-10 23:08:49 +02:00
"updated_at": "2020-10-10T20:49:10Z",
2020-09-19 05:08:41 +02:00
"pushed_at": "2020-07-24T17:11:05Z",
2020-10-10 23:08:49 +02:00
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
2020-09-19 05:08:41 +02:00
"score": 0
},
{
"id": 282479219,
"name": "CVE-2020-3452",
"full_name": "foulenzer\/CVE-2020-3452",
"owner": {
"login": "foulenzer",
"id": 41641874,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/41641874?v=4",
"html_url": "https:\/\/github.com\/foulenzer"
},
"html_url": "https:\/\/github.com\/foulenzer\/CVE-2020-3452",
"description": "Little, stupid python validator(?) for CVE-2020-3452 on CISCO devices.",
"fork": false,
"created_at": "2020-07-25T16:11:55Z",
2020-10-20 17:09:25 +02:00
"updated_at": "2020-10-20T14:27:21Z",
2020-09-19 05:08:41 +02:00
"pushed_at": "2020-08-02T16:11:11Z",
2020-09-22 11:09:01 +02:00
"stargazers_count": 3,
"watchers_count": 3,
2020-09-19 05:08:41 +02:00
"forks_count": 1,
"forks": 1,
2020-09-22 11:09:01 +02:00
"watchers": 3,
2020-09-19 05:08:41 +02:00
"score": 0
},
{
"id": 283542069,
"name": "http-vuln-cve2020-3452.nse",
"full_name": "Gh0st0ne\/http-vuln-cve2020-3452.nse",
"owner": {
"login": "Gh0st0ne",
"id": 47971115,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/47971115?v=4",
"html_url": "https:\/\/github.com\/Gh0st0ne"
},
"html_url": "https:\/\/github.com\/Gh0st0ne\/http-vuln-cve2020-3452.nse",
"description": "CVE-2020-3452 : Cisco ASA and FTD Unauthorized Remote File Reading Nmap NSE Script",
"fork": false,
"created_at": "2020-07-29T15:57:26Z",
"updated_at": "2020-07-30T23:54:22Z",
2020-10-15 17:09:03 +02:00
"pushed_at": "2020-10-15T13:42:19Z",
2020-09-19 05:08:41 +02:00
"stargazers_count": 0,
"watchers_count": 0,
2020-10-15 17:09:03 +02:00
"forks_count": 1,
"forks": 1,
2020-09-19 05:08:41 +02:00
"watchers": 0,
"score": 0
},
{
"id": 284219767,
"name": "CVE-2020-3452",
"full_name": "0x5ECF4ULT\/CVE-2020-3452",
"owner": {
"login": "0x5ECF4ULT",
"id": 17967646,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/17967646?v=4",
"html_url": "https:\/\/github.com\/0x5ECF4ULT"
},
"html_url": "https:\/\/github.com\/0x5ECF4ULT\/CVE-2020-3452",
"description": "CVE-2020-3452 exploit",
"fork": false,
"created_at": "2020-08-01T08:27:11Z",
2020-11-10 16:09:13 +01:00
"updated_at": "2020-11-10T11:10:27Z",
2020-09-19 05:08:41 +02:00
"pushed_at": "2020-08-01T08:59:28Z",
2020-11-10 16:09:13 +01:00
"stargazers_count": 24,
"watchers_count": 24,
2020-10-08 17:12:37 +02:00
"forks_count": 2,
"forks": 2,
2020-11-10 16:09:13 +01:00
"watchers": 24,
2020-09-19 05:08:41 +02:00
"score": 0
},
{
"id": 284677041,
"name": "CVE-2020-3452",
"full_name": "paran0id34\/CVE-2020-3452",
"owner": {
"login": "paran0id34",
"id": 68892986,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/68892986?v=4",
"html_url": "https:\/\/github.com\/paran0id34"
},
"html_url": "https:\/\/github.com\/paran0id34\/CVE-2020-3452",
"description": "CVE-2020-3452 - directory traversal in Cisco ASA and Cisco Firepower Threat Defense",
"fork": false,
"created_at": "2020-08-03T11:02:23Z",
"updated_at": "2020-08-04T08:22:02Z",
"pushed_at": "2020-08-04T08:22:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
2020-08-13 11:08:41 +02:00
{
"id": 287222475,
"name": "CVE-2020-3452",
"full_name": "murataydemir\/CVE-2020-3452",
"owner": {
"login": "murataydemir",
"id": 16391655,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/16391655?v=4",
"html_url": "https:\/\/github.com\/murataydemir"
},
"html_url": "https:\/\/github.com\/murataydemir\/CVE-2020-3452",
2020-08-30 05:08:27 +02:00
"description": "[CVE-2020-3452] Cisco Adaptive Security Appliance (ASA) & Cisco Firepower Threat Defense (FTD) Web Service Read-Only Directory Traversal",
2020-08-13 11:08:41 +02:00
"fork": false,
"created_at": "2020-08-13T08:22:27Z",
2020-09-16 23:08:58 +02:00
"updated_at": "2020-09-16T20:50:04Z",
"pushed_at": "2020-09-16T20:50:02Z",
2020-08-13 11:08:41 +02:00
"stargazers_count": 0,
"watchers_count": 0,
2020-08-15 23:09:11 +02:00
"forks_count": 2,
"forks": 2,
2020-08-13 11:08:41 +02:00
"watchers": 0,
"score": 0
2020-09-19 05:08:41 +02:00
},
{
"id": 291733229,
"name": "Cisco-ASA-LFI",
"full_name": "ludy-dev\/Cisco-ASA-LFI",
"owner": {
"login": "ludy-dev",
"id": 70466565,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/70466565?v=4",
"html_url": "https:\/\/github.com\/ludy-dev"
},
"html_url": "https:\/\/github.com\/ludy-dev\/Cisco-ASA-LFI",
"description": "(CVE-2020-3452) Cisco Adaptive Security Appliance Software - Local File Inclusion Vuln Test sciript",
"fork": false,
"created_at": "2020-08-31T14:11:19Z",
2020-11-07 16:08:57 +01:00
"updated_at": "2020-11-07T10:00:24Z",
"pushed_at": "2020-11-07T10:00:22Z",
2020-10-26 16:08:59 +01:00
"stargazers_count": 1,
"watchers_count": 1,
2020-09-19 05:08:41 +02:00
"forks_count": 0,
"forks": 0,
2020-10-26 16:08:59 +01:00
"watchers": 1,
2020-09-19 05:08:41 +02:00
"score": 0
2020-09-28 11:09:02 +02:00
},
{
"id": 299192944,
2020-10-10 23:08:49 +02:00
"name": "CVE-2020-3452-Exploit",
"full_name": "3ndG4me\/CVE-2020-3452-Exploit",
2020-09-28 11:09:02 +02:00
"owner": {
"login": "3ndG4me",
"id": 14339392,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/14339392?v=4",
"html_url": "https:\/\/github.com\/3ndG4me"
},
2020-10-10 23:08:49 +02:00
"html_url": "https:\/\/github.com\/3ndG4me\/CVE-2020-3452-Exploit",
2020-09-28 11:09:02 +02:00
"description": "Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.",
"fork": false,
"created_at": "2020-09-28T05:00:37Z",
2020-10-24 11:08:54 +02:00
"updated_at": "2020-10-24T06:00:25Z",
2020-10-10 23:08:49 +02:00
"pushed_at": "2020-10-10T17:19:51Z",
2020-10-24 11:08:54 +02:00
"stargazers_count": 1,
"watchers_count": 1,
2020-10-20 23:08:37 +02:00
"forks_count": 2,
"forks": 2,
2020-10-24 11:08:54 +02:00
"watchers": 1,
2020-09-28 11:09:02 +02:00
"score": 0
2020-11-19 04:09:18 +01:00
},
{
"id": 314063056,
"name": "CVE-2020-3452",
"full_name": "grim3\/CVE-2020-3452",
"owner": {
"login": "grim3",
"id": 24641185,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/24641185?v=4",
"html_url": "https:\/\/github.com\/grim3"
},
"html_url": "https:\/\/github.com\/grim3\/CVE-2020-3452",
"description": "CVE-2020-3452",
"fork": false,
"created_at": "2020-11-18T21:31:50Z",
"updated_at": "2020-11-18T21:48:22Z",
"pushed_at": "2020-11-18T21:45:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
2020-07-24 05:08:27 +02:00
}
]