[ { "id": 282249421, "name": "CVE-2020-3452-Cisco-Scanner", "full_name": "PR3R00T\/CVE-2020-3452-Cisco-Scanner", "owner": { "login": "PR3R00T", "id": 50199640, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/50199640?v=4", "html_url": "https:\/\/github.com\/PR3R00T" }, "html_url": "https:\/\/github.com\/PR3R00T\/CVE-2020-3452-Cisco-Scanner", "description": "CVE-2020-3452 Cisco ASA Scanner -unauth Path Traversal Check", "fork": false, "created_at": "2020-07-24T15:04:45Z", "updated_at": "2020-12-02T02:37:10Z", "pushed_at": "2020-08-30T21:34:41Z", "stargazers_count": 15, "watchers_count": 15, "forks_count": 5, "forks": 5, "watchers": 15, "score": 0 }, { "id": 287222475, "name": "CVE-2020-3452", "full_name": "murataydemir\/CVE-2020-3452", "owner": { "login": "murataydemir", "id": 16391655, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/16391655?v=4", "html_url": "https:\/\/github.com\/murataydemir" }, "html_url": "https:\/\/github.com\/murataydemir\/CVE-2020-3452", "description": "[CVE-2020-3452] Cisco Adaptive Security Appliance (ASA) & Cisco Firepower Threat Defense (FTD) Web Service Read-Only Directory Traversal", "fork": false, "created_at": "2020-08-13T08:22:27Z", "updated_at": "2020-09-16T20:50:04Z", "pushed_at": "2020-09-16T20:50:02Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 2, "forks": 2, "watchers": 0, "score": 0 }, { "id": 291733229, "name": "Cisco-ASA-LFI", "full_name": "ludy-dev\/Cisco-ASA-LFI", "owner": { "login": "ludy-dev", "id": 70466565, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/70466565?v=4", "html_url": "https:\/\/github.com\/ludy-dev" }, "html_url": "https:\/\/github.com\/ludy-dev\/Cisco-ASA-LFI", "description": "(CVE-2020-3452) Cisco Adaptive Security Appliance Software - Local File Inclusion Vuln Test sciript", "fork": false, "created_at": "2020-08-31T14:11:19Z", "updated_at": "2020-11-07T10:00:24Z", "pushed_at": "2020-11-07T10:00:22Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "forks": 0, "watchers": 1, "score": 0 }, { "id": 299192944, "name": "CVE-2020-3452-Exploit", "full_name": "3ndG4me\/CVE-2020-3452-Exploit", "owner": { "login": "3ndG4me", "id": 14339392, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/14339392?v=4", "html_url": "https:\/\/github.com\/3ndG4me" }, "html_url": "https:\/\/github.com\/3ndG4me\/CVE-2020-3452-Exploit", "description": "Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.", "fork": false, "created_at": "2020-09-28T05:00:37Z", "updated_at": "2020-10-24T06:00:25Z", "pushed_at": "2020-10-10T17:19:51Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 2, "forks": 2, "watchers": 1, "score": 0 }, { "id": 314063056, "name": "CVE-2020-3452", "full_name": "grim3\/CVE-2020-3452", "owner": { "login": "grim3", "id": 24641185, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/24641185?v=4", "html_url": "https:\/\/github.com\/grim3" }, "html_url": "https:\/\/github.com\/grim3\/CVE-2020-3452", "description": "CVE-2020-3452", "fork": false, "created_at": "2020-11-18T21:31:50Z", "updated_at": "2020-11-18T21:48:22Z", "pushed_at": "2020-11-18T21:45:18Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 321075427, "name": "CVE-2020-3452", "full_name": "cygenta\/CVE-2020-3452", "owner": { "login": "cygenta", "id": 49716463, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/49716463?v=4", "html_url": "https:\/\/github.com\/cygenta" }, "html_url": "https:\/\/github.com\/cygenta\/CVE-2020-3452", "description": null, "fork": false, "created_at": "2020-12-13T13:47:38Z", "updated_at": "2020-12-16T12:02:35Z", "pushed_at": "2020-12-13T13:49:30Z", "stargazers_count": 9, "watchers_count": 9, "forks_count": 4, "forks": 4, "watchers": 9, "score": 0 } ]