[ { "id": 282086490, "name": "CVE-2020-3452-PoC", "full_name": "XDev05\/CVE-2020-3452-PoC", "owner": { "login": "XDev05", "id": 55960303, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55960303?v=4", "html_url": "https:\/\/github.com\/XDev05", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/XDev05\/CVE-2020-3452-PoC", "description": null, "fork": false, "created_at": "2020-07-24T00:39:11Z", "updated_at": "2020-09-17T04:12:51Z", "pushed_at": "2020-07-24T00:49:40Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 0 }, { "id": 282135631, "name": "cve-2020-3452", "full_name": "Loneyers\/cve-2020-3452", "owner": { "login": "Loneyers", "id": 29177120, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29177120?v=4", "html_url": "https:\/\/github.com\/Loneyers", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Loneyers\/cve-2020-3452", "description": "unauth file read in cisco asa & firepower.", "fork": false, "created_at": "2020-07-24T05:56:32Z", "updated_at": "2021-08-14T01:56:21Z", "pushed_at": "2020-07-24T06:02:19Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 0 }, { "id": 282249421, "name": "CVE-2020-3452-Cisco-Scanner", "full_name": "PR3R00T\/CVE-2020-3452-Cisco-Scanner", "owner": { "login": "PR3R00T", "id": 50199640, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50199640?v=4", "html_url": "https:\/\/github.com\/PR3R00T", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/PR3R00T\/CVE-2020-3452-Cisco-Scanner", "description": "CVE-2020-3452 Cisco ASA Scanner -unauth Path Traversal Check", "fork": false, "created_at": "2020-07-24T15:04:45Z", "updated_at": "2024-11-26T06:19:54Z", "pushed_at": "2020-08-30T21:34:41Z", "stargazers_count": 25, "watchers_count": 25, "has_discussions": false, "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 6, "watchers": 25, "score": 0, "subscribers_count": 1 }, { "id": 282267605, "name": "CVE-2020-3452", "full_name": "mr-r3b00t\/CVE-2020-3452", "owner": { "login": "mr-r3b00t", "id": 14963690, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14963690?v=4", "html_url": "https:\/\/github.com\/mr-r3b00t", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mr-r3b00t\/CVE-2020-3452", "description": null, "fork": false, "created_at": "2020-07-24T16:26:52Z", "updated_at": "2024-08-12T20:04:04Z", "pushed_at": "2020-07-24T17:11:05Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 282479219, "name": "CVE-2020-3452", "full_name": "foulenzer\/CVE-2020-3452", "owner": { "login": "foulenzer", "id": 41641874, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41641874?v=4", "html_url": "https:\/\/github.com\/foulenzer", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/foulenzer\/CVE-2020-3452", "description": "Little, stupid python validator(?) for CVE-2020-3452 on CISCO devices.", "fork": false, "created_at": "2020-07-25T16:11:55Z", "updated_at": "2020-10-20T14:27:21Z", "pushed_at": "2020-08-02T16:11:11Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "bugbounty", "cisco", "cve-2020-3452", "itsec" ], "visibility": "public", "forks": 1, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 283542069, "name": "http-vuln-cve2020-3452.nse", "full_name": "Gh0st0ne\/http-vuln-cve2020-3452.nse", "owner": { "login": "Gh0st0ne", "id": 47971115, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47971115?v=4", "html_url": "https:\/\/github.com\/Gh0st0ne", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Gh0st0ne\/http-vuln-cve2020-3452.nse", "description": "CVE-2020-3452 : Cisco ASA and FTD Unauthorized Remote File Reading Nmap NSE Script", "fork": false, "created_at": "2020-07-29T15:57:26Z", "updated_at": "2020-07-30T23:54:22Z", "pushed_at": "2020-10-15T13:42:19Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 284219767, "name": "CVE-2020-3452", "full_name": "0x5ECF4ULT\/CVE-2020-3452", "owner": { "login": "0x5ECF4ULT", "id": 17967646, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17967646?v=4", "html_url": "https:\/\/github.com\/0x5ECF4ULT", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0x5ECF4ULT\/CVE-2020-3452", "description": "CVE-2020-3452 exploit", "fork": false, "created_at": "2020-08-01T08:27:11Z", "updated_at": "2024-07-15T15:03:20Z", "pushed_at": "2020-08-01T08:59:28Z", "stargazers_count": 24, "watchers_count": 24, "has_discussions": false, "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 5, "watchers": 24, "score": 0, "subscribers_count": 1 }, { "id": 284677041, "name": "CVE-2020-3452", "full_name": "paran0id34\/CVE-2020-3452", "owner": { "login": "paran0id34", "id": 68892986, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68892986?v=4", "html_url": "https:\/\/github.com\/paran0id34", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/paran0id34\/CVE-2020-3452", "description": "CVE-2020-3452 - directory traversal in Cisco ASA and Cisco Firepower Threat Defense", "fork": false, "created_at": "2020-08-03T11:02:23Z", "updated_at": "2022-07-06T09:55:04Z", "pushed_at": "2021-06-02T02:44:56Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 287222475, "name": "CVE-2020-3452", "full_name": "murataydemir\/CVE-2020-3452", "owner": { "login": "murataydemir", "id": 16391655, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16391655?v=4", "html_url": "https:\/\/github.com\/murataydemir", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/murataydemir\/CVE-2020-3452", "description": "[CVE-2020-3452] Cisco Adaptive Security Appliance (ASA) & Cisco Firepower Threat Defense (FTD) Web Service Read-Only Directory Traversal", "fork": false, "created_at": "2020-08-13T08:22:27Z", "updated_at": "2024-08-12T20:04:39Z", "pushed_at": "2020-09-16T20:50:02Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 6, "watchers": 7, "score": 0, "subscribers_count": 1 }, { "id": 291733229, "name": "Cisco-ASA-LFI", "full_name": "ludy-dev\/Cisco-ASA-LFI", "owner": { "login": "ludy-dev", "id": 70466565, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70466565?v=4", "html_url": "https:\/\/github.com\/ludy-dev", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ludy-dev\/Cisco-ASA-LFI", "description": "(CVE-2020-3452) Cisco Adaptive Security Appliance Software - Local File Inclusion Vuln Test sciript", "fork": false, "created_at": "2020-08-31T14:11:19Z", "updated_at": "2020-11-07T10:00:24Z", "pushed_at": "2020-11-07T10:00:22Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 299192944, "name": "CVE-2020-3452-Exploit", "full_name": "3ndG4me\/CVE-2020-3452-Exploit", "owner": { "login": "3ndG4me", "id": 14339392, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14339392?v=4", "html_url": "https:\/\/github.com\/3ndG4me", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/3ndG4me\/CVE-2020-3452-Exploit", "description": "Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.", "fork": false, "created_at": "2020-09-28T05:00:37Z", "updated_at": "2024-11-26T06:19:59Z", "pushed_at": "2020-10-10T17:19:51Z", "stargazers_count": 25, "watchers_count": 25, "has_discussions": false, "forks_count": 11, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "bash", "cisco", "cve", "cve-2020-3452", "exploit", "hacktoberfest", "shell", "vulnerability" ], "visibility": "public", "forks": 11, "watchers": 25, "score": 0, "subscribers_count": 2 }, { "id": 314063056, "name": "CVE-2020-3452", "full_name": "grim3\/CVE-2020-3452", "owner": { "login": "grim3", "id": 24641185, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24641185?v=4", "html_url": "https:\/\/github.com\/grim3", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/grim3\/CVE-2020-3452", "description": "CVE-2020-3452", "fork": false, "created_at": "2020-11-18T21:31:50Z", "updated_at": "2024-08-14T06:19:52Z", "pushed_at": "2020-11-18T21:45:18Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 4, "score": 0, "subscribers_count": 1 }, { "id": 321075427, "name": "CVE-2020-3452", "full_name": "cygenta\/CVE-2020-3452", "owner": { "login": "cygenta", "id": 49716463, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49716463?v=4", "html_url": "https:\/\/github.com\/cygenta", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cygenta\/CVE-2020-3452", "description": null, "fork": false, "created_at": "2020-12-13T13:47:38Z", "updated_at": "2024-01-28T18:09:57Z", "pushed_at": "2022-06-02T20:15:06Z", "stargazers_count": 26, "watchers_count": 26, "has_discussions": false, "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 9, "watchers": 26, "score": 0, "subscribers_count": 3 }, { "id": 327027118, "name": "CISCO-CVE-2020-3452-Scanner-Exploiter", "full_name": "darklotuskdb\/CISCO-CVE-2020-3452-Scanner-Exploiter", "owner": { "login": "darklotuskdb", "id": 29382875, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29382875?v=4", "html_url": "https:\/\/github.com\/darklotuskdb", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/darklotuskdb\/CISCO-CVE-2020-3452-Scanner-Exploiter", "description": "CISCO CVE-2020-3452 Scanner & Exploiter", "fork": false, "created_at": "2021-01-05T14:41:13Z", "updated_at": "2024-08-12T20:09:08Z", "pushed_at": "2021-07-29T09:28:20Z", "stargazers_count": 98, "watchers_count": 98, "has_discussions": false, "forks_count": 30, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 30, "watchers": 98, "score": 0, "subscribers_count": 5 }, { "id": 335520796, "name": "Cisco-ASA-FTD-Web-Services-Traversal", "full_name": "fuzzlove\/Cisco-ASA-FTD-Web-Services-Traversal", "owner": { "login": "fuzzlove", "id": 44779781, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44779781?v=4", "html_url": "https:\/\/github.com\/fuzzlove", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/fuzzlove\/Cisco-ASA-FTD-Web-Services-Traversal", "description": "CVE-2020-3452 - Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) traversal", "fork": false, "created_at": "2021-02-03T05:45:53Z", "updated_at": "2024-04-25T05:17:46Z", "pushed_at": "2021-02-03T12:19:16Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "exploit", "penetration-testing" ], "visibility": "public", "forks": 2, "watchers": 5, "score": 0, "subscribers_count": 2 }, { "id": 336020236, "name": "Cisco-CVE-2020-3452-shodan-scanner", "full_name": "faisalfs10x\/Cisco-CVE-2020-3452-shodan-scanner", "owner": { "login": "faisalfs10x", "id": 51811615, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51811615?v=4", "html_url": "https:\/\/github.com\/faisalfs10x", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/faisalfs10x\/Cisco-CVE-2020-3452-shodan-scanner", "description": "simple bash script of CVE-2020-3452 Cisco ASA \/ Firepower Read-Only Path Traversal Vulnerability checker ", "fork": false, "created_at": "2021-02-04T16:50:27Z", "updated_at": "2023-04-22T21:34:29Z", "pushed_at": "2021-02-04T17:38:25Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2020-3452", "exploit", "poc", "shodan-dorks" ], "visibility": "public", "forks": 2, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 375576943, "name": "CVE-2020-3452", "full_name": "sujaygr8\/CVE-2020-3452", "owner": { "login": "sujaygr8", "id": 39243813, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39243813?v=4", "html_url": "https:\/\/github.com\/sujaygr8", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sujaygr8\/CVE-2020-3452", "description": null, "fork": false, "created_at": "2021-06-10T05:09:52Z", "updated_at": "2021-06-14T07:36:50Z", "pushed_at": "2021-06-14T07:36:47Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 424128615, "name": "CVE-2020-3452", "full_name": "Aviksaikat\/CVE-2020-3452", "owner": { "login": "Aviksaikat", "id": 31238298, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31238298?v=4", "html_url": "https:\/\/github.com\/Aviksaikat", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Aviksaikat\/CVE-2020-3452", "description": "Test vulnerability of CVE-2020-3452", "fork": false, "created_at": "2021-11-03T07:27:14Z", "updated_at": "2023-02-06T13:44:50Z", "pushed_at": "2021-11-03T09:04:26Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 446508911, "name": "CVE-2020-3452_auto", "full_name": "Veids\/CVE-2020-3452_auto", "owner": { "login": "Veids", "id": 13793356, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13793356?v=4", "html_url": "https:\/\/github.com\/Veids", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Veids\/CVE-2020-3452_auto", "description": null, "fork": false, "created_at": "2022-01-10T16:56:40Z", "updated_at": "2022-01-10T16:58:25Z", "pushed_at": "2022-01-10T16:58:22Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 489632798, "name": "cve-2020-3452", "full_name": "iveresk\/cve-2020-3452", "owner": { "login": "iveresk", "id": 28754633, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4", "html_url": "https:\/\/github.com\/iveresk", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/iveresk\/cve-2020-3452", "description": "Just proof of concept for Cisco CVE-2020-3452. Using external or internal file base.", "fork": false, "created_at": "2022-05-07T09:45:25Z", "updated_at": "2022-05-07T09:47:56Z", "pushed_at": "2022-05-07T09:47:53Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 805701801, "name": "CVE-2020-3452", "full_name": "Cappricio-Securities\/CVE-2020-3452", "owner": { "login": "Cappricio-Securities", "id": 102907425, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4", "html_url": "https:\/\/github.com\/Cappricio-Securities", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2020-3452", "description": "Cisco Adaptive Security Appliance (ASA)\/Firepower Threat Defense (FTD) - Local File Inclusion", "fork": false, "created_at": "2024-05-25T08:11:31Z", "updated_at": "2024-06-24T08:50:19Z", "pushed_at": "2024-06-24T08:49:55Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "bugbounty", "bugbounty-tool", "bugbounty-tools", "cisco", "cisco-adaptive", "cve", "cve-2020-3452", "cve-2020-3452-exploit", "cve-2020-3452-poc", "cve-2020-3452-scanner", "lfi" ], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 0 } ]