2020-07-24 05:08:27 +02:00
[
2020-12-30 22:09:58 +01:00
{
"id" : 282086490 ,
"name" : "CVE-2020-3452-PoC" ,
"full_name" : "XDev05\/CVE-2020-3452-PoC" ,
"owner" : {
"login" : "XDev05" ,
"id" : 55960303 ,
"avatar_url" : "https:\/\/avatars3.githubusercontent.com\/u\/55960303?v=4" ,
"html_url" : "https:\/\/github.com\/XDev05"
} ,
"html_url" : "https:\/\/github.com\/XDev05\/CVE-2020-3452-PoC" ,
"description" : null ,
"fork" : false ,
"created_at" : "2020-07-24T00:39:11Z" ,
"updated_at" : "2020-09-17T04:12:51Z" ,
"pushed_at" : "2020-07-24T00:49:40Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 2 ,
"score" : 0
} ,
{
"id" : 282135631 ,
"name" : "cve-2020-3452" ,
"full_name" : "Loneyers\/cve-2020-3452" ,
"owner" : {
"login" : "Loneyers" ,
"id" : 29177120 ,
"avatar_url" : "https:\/\/avatars3.githubusercontent.com\/u\/29177120?v=4" ,
"html_url" : "https:\/\/github.com\/Loneyers"
} ,
"html_url" : "https:\/\/github.com\/Loneyers\/cve-2020-3452" ,
"description" : "unauth file read in cisco asa & firepower." ,
"fork" : false ,
"created_at" : "2020-07-24T05:56:32Z" ,
"updated_at" : "2020-08-17T08:48:02Z" ,
"pushed_at" : "2020-07-24T06:02:19Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0
} ,
{
"id" : 282249421 ,
"name" : "CVE-2020-3452-Cisco-Scanner" ,
"full_name" : "PR3R00T\/CVE-2020-3452-Cisco-Scanner" ,
"owner" : {
"login" : "PR3R00T" ,
"id" : 50199640 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/50199640?v=4" ,
"html_url" : "https:\/\/github.com\/PR3R00T"
} ,
"html_url" : "https:\/\/github.com\/PR3R00T\/CVE-2020-3452-Cisco-Scanner" ,
"description" : "CVE-2020-3452 Cisco ASA Scanner -unauth Path Traversal Check" ,
"fork" : false ,
"created_at" : "2020-07-24T15:04:45Z" ,
2021-01-08 16:10:03 +01:00
"updated_at" : "2021-01-08T14:50:38Z" ,
2020-12-30 22:09:58 +01:00
"pushed_at" : "2020-08-30T21:34:41Z" ,
2021-01-08 16:10:03 +01:00
"stargazers_count" : 16 ,
"watchers_count" : 16 ,
2020-12-30 22:09:58 +01:00
"forks_count" : 5 ,
"forks" : 5 ,
2021-01-08 16:10:03 +01:00
"watchers" : 16 ,
2020-12-30 22:09:58 +01:00
"score" : 0
} ,
{
"id" : 282267605 ,
"name" : "CVE-2020-3452" ,
"full_name" : "mr-r3b00t\/CVE-2020-3452" ,
"owner" : {
"login" : "mr-r3b00t" ,
"id" : 14963690 ,
"avatar_url" : "https:\/\/avatars0.githubusercontent.com\/u\/14963690?v=4" ,
"html_url" : "https:\/\/github.com\/mr-r3b00t"
} ,
"html_url" : "https:\/\/github.com\/mr-r3b00t\/CVE-2020-3452" ,
"description" : null ,
"fork" : false ,
"created_at" : "2020-07-24T16:26:52Z" ,
"updated_at" : "2020-10-10T20:49:10Z" ,
"pushed_at" : "2020-07-24T17:11:05Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 2 ,
"forks" : 2 ,
"watchers" : 1 ,
"score" : 0
} ,
{
"id" : 282479219 ,
"name" : "CVE-2020-3452" ,
"full_name" : "foulenzer\/CVE-2020-3452" ,
"owner" : {
"login" : "foulenzer" ,
"id" : 41641874 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/41641874?v=4" ,
"html_url" : "https:\/\/github.com\/foulenzer"
} ,
"html_url" : "https:\/\/github.com\/foulenzer\/CVE-2020-3452" ,
"description" : "Little, stupid python validator(?) for CVE-2020-3452 on CISCO devices." ,
"fork" : false ,
"created_at" : "2020-07-25T16:11:55Z" ,
"updated_at" : "2020-10-20T14:27:21Z" ,
"pushed_at" : "2020-08-02T16:11:11Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"forks_count" : 1 ,
"forks" : 1 ,
"watchers" : 3 ,
"score" : 0
} ,
{
"id" : 283542069 ,
"name" : "http-vuln-cve2020-3452.nse" ,
"full_name" : "Gh0st0ne\/http-vuln-cve2020-3452.nse" ,
"owner" : {
"login" : "Gh0st0ne" ,
"id" : 47971115 ,
"avatar_url" : "https:\/\/avatars0.githubusercontent.com\/u\/47971115?v=4" ,
"html_url" : "https:\/\/github.com\/Gh0st0ne"
} ,
"html_url" : "https:\/\/github.com\/Gh0st0ne\/http-vuln-cve2020-3452.nse" ,
"description" : "CVE-2020-3452 : Cisco ASA and FTD Unauthorized Remote File Reading Nmap NSE Script" ,
"fork" : false ,
"created_at" : "2020-07-29T15:57:26Z" ,
"updated_at" : "2020-07-30T23:54:22Z" ,
"pushed_at" : "2020-10-15T13:42:19Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 1 ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 284219767 ,
"name" : "CVE-2020-3452" ,
"full_name" : "0x5ECF4ULT\/CVE-2020-3452" ,
"owner" : {
"login" : "0x5ECF4ULT" ,
"id" : 17967646 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/17967646?v=4" ,
"html_url" : "https:\/\/github.com\/0x5ECF4ULT"
} ,
"html_url" : "https:\/\/github.com\/0x5ECF4ULT\/CVE-2020-3452" ,
"description" : "CVE-2020-3452 exploit" ,
"fork" : false ,
"created_at" : "2020-08-01T08:27:11Z" ,
"updated_at" : "2020-11-10T11:10:27Z" ,
"pushed_at" : "2020-08-01T08:59:28Z" ,
"stargazers_count" : 24 ,
"watchers_count" : 24 ,
"forks_count" : 2 ,
"forks" : 2 ,
"watchers" : 24 ,
"score" : 0
} ,
{
"id" : 284677041 ,
"name" : "CVE-2020-3452" ,
"full_name" : "paran0id34\/CVE-2020-3452" ,
"owner" : {
"login" : "paran0id34" ,
"id" : 68892986 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/68892986?v=4" ,
"html_url" : "https:\/\/github.com\/paran0id34"
} ,
"html_url" : "https:\/\/github.com\/paran0id34\/CVE-2020-3452" ,
"description" : "CVE-2020-3452 - directory traversal in Cisco ASA and Cisco Firepower Threat Defense" ,
"fork" : false ,
"created_at" : "2020-08-03T11:02:23Z" ,
"updated_at" : "2020-08-04T08:22:02Z" ,
"pushed_at" : "2020-08-04T08:22:00Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 1 ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 287222475 ,
"name" : "CVE-2020-3452" ,
"full_name" : "murataydemir\/CVE-2020-3452" ,
"owner" : {
"login" : "murataydemir" ,
"id" : 16391655 ,
"avatar_url" : "https:\/\/avatars3.githubusercontent.com\/u\/16391655?v=4" ,
"html_url" : "https:\/\/github.com\/murataydemir"
} ,
"html_url" : "https:\/\/github.com\/murataydemir\/CVE-2020-3452" ,
"description" : "[CVE-2020-3452] Cisco Adaptive Security Appliance (ASA) & Cisco Firepower Threat Defense (FTD) Web Service Read-Only Directory Traversal" ,
"fork" : false ,
"created_at" : "2020-08-13T08:22:27Z" ,
"updated_at" : "2020-09-16T20:50:04Z" ,
"pushed_at" : "2020-09-16T20:50:02Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 2 ,
"forks" : 2 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 291733229 ,
"name" : "Cisco-ASA-LFI" ,
"full_name" : "ludy-dev\/Cisco-ASA-LFI" ,
"owner" : {
"login" : "ludy-dev" ,
"id" : 70466565 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/70466565?v=4" ,
"html_url" : "https:\/\/github.com\/ludy-dev"
} ,
"html_url" : "https:\/\/github.com\/ludy-dev\/Cisco-ASA-LFI" ,
"description" : "(CVE-2020-3452) Cisco Adaptive Security Appliance Software - Local File Inclusion Vuln Test sciript" ,
"fork" : false ,
"created_at" : "2020-08-31T14:11:19Z" ,
"updated_at" : "2020-11-07T10:00:24Z" ,
"pushed_at" : "2020-11-07T10:00:22Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0
} ,
{
"id" : 299192944 ,
"name" : "CVE-2020-3452-Exploit" ,
"full_name" : "3ndG4me\/CVE-2020-3452-Exploit" ,
"owner" : {
"login" : "3ndG4me" ,
"id" : 14339392 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/14339392?v=4" ,
"html_url" : "https:\/\/github.com\/3ndG4me"
} ,
"html_url" : "https:\/\/github.com\/3ndG4me\/CVE-2020-3452-Exploit" ,
"description" : "Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances." ,
"fork" : false ,
"created_at" : "2020-09-28T05:00:37Z" ,
2021-01-09 10:09:54 +01:00
"updated_at" : "2021-01-09T07:41:00Z" ,
2020-12-30 22:09:58 +01:00
"pushed_at" : "2020-10-10T17:19:51Z" ,
2021-01-09 10:09:54 +01:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2020-12-30 22:09:58 +01:00
"forks_count" : 2 ,
"forks" : 2 ,
2021-01-09 10:09:54 +01:00
"watchers" : 2 ,
2020-12-30 22:09:58 +01:00
"score" : 0
} ,
{
"id" : 314063056 ,
"name" : "CVE-2020-3452" ,
"full_name" : "grim3\/CVE-2020-3452" ,
"owner" : {
"login" : "grim3" ,
"id" : 24641185 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/24641185?v=4" ,
"html_url" : "https:\/\/github.com\/grim3"
} ,
"html_url" : "https:\/\/github.com\/grim3\/CVE-2020-3452" ,
"description" : "CVE-2020-3452" ,
"fork" : false ,
"created_at" : "2020-11-18T21:31:50Z" ,
"updated_at" : "2020-11-18T21:48:22Z" ,
"pushed_at" : "2020-11-18T21:45:18Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
2020-12-13 16:09:45 +01:00
{
"id" : 321075427 ,
"name" : "CVE-2020-3452" ,
"full_name" : "cygenta\/CVE-2020-3452" ,
"owner" : {
"login" : "cygenta" ,
"id" : 49716463 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/49716463?v=4" ,
"html_url" : "https:\/\/github.com\/cygenta"
} ,
"html_url" : "https:\/\/github.com\/cygenta\/CVE-2020-3452" ,
"description" : null ,
"fork" : false ,
"created_at" : "2020-12-13T13:47:38Z" ,
2020-12-16 16:11:19 +01:00
"updated_at" : "2020-12-16T12:02:35Z" ,
2020-12-13 16:09:45 +01:00
"pushed_at" : "2020-12-13T13:49:30Z" ,
2020-12-16 16:11:19 +01:00
"stargazers_count" : 9 ,
"watchers_count" : 9 ,
2020-12-19 22:10:33 +01:00
"forks_count" : 4 ,
"forks" : 4 ,
2020-12-16 16:11:19 +01:00
"watchers" : 9 ,
2020-12-13 16:09:45 +01:00
"score" : 0
2021-01-05 16:09:56 +01:00
} ,
{
"id" : 327027118 ,
"name" : "CISCO-CVE-2020-3452-Scanner-Exploiter" ,
"full_name" : "darklotuskdb\/CISCO-CVE-2020-3452-Scanner-Exploiter" ,
"owner" : {
"login" : "darklotuskdb" ,
"id" : 29382875 ,
"avatar_url" : "https:\/\/avatars3.githubusercontent.com\/u\/29382875?v=4" ,
"html_url" : "https:\/\/github.com\/darklotuskdb"
} ,
"html_url" : "https:\/\/github.com\/darklotuskdb\/CISCO-CVE-2020-3452-Scanner-Exploiter" ,
"description" : "CISCO CVE-2020-3452 Scanner & Exploiter" ,
"fork" : false ,
"created_at" : "2021-01-05T14:41:13Z" ,
2021-01-09 10:09:54 +01:00
"updated_at" : "2021-01-09T08:43:55Z" ,
"pushed_at" : "2021-01-09T08:43:53Z" ,
2021-01-08 04:10:04 +01:00
"stargazers_count" : 47 ,
"watchers_count" : 47 ,
2021-01-09 04:09:46 +01:00
"forks_count" : 9 ,
"forks" : 9 ,
2021-01-08 04:10:04 +01:00
"watchers" : 47 ,
2021-01-05 16:09:56 +01:00
"score" : 0
2020-07-24 05:08:27 +02:00
}
]