[ { "id": 282086490, "name": "CVE-2020-3452-PoC", "full_name": "XDev05\/CVE-2020-3452-PoC", "owner": { "login": "XDev05", "id": 55960303, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/55960303?v=4", "html_url": "https:\/\/github.com\/XDev05" }, "html_url": "https:\/\/github.com\/XDev05\/CVE-2020-3452-PoC", "description": null, "fork": false, "created_at": "2020-07-24T00:39:11Z", "updated_at": "2020-07-30T17:30:27Z", "pushed_at": "2020-07-24T00:49:40Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "forks": 0, "watchers": 1, "score": 0 }, { "id": 282135631, "name": "cve-2020-3452", "full_name": "Loneyers\/cve-2020-3452", "owner": { "login": "Loneyers", "id": 29177120, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/29177120?v=4", "html_url": "https:\/\/github.com\/Loneyers" }, "html_url": "https:\/\/github.com\/Loneyers\/cve-2020-3452", "description": "unauth file read in cisco asa & firepower.", "fork": false, "created_at": "2020-07-24T05:56:32Z", "updated_at": "2020-07-24T06:02:21Z", "pushed_at": "2020-07-24T06:02:19Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 282249421, "name": "CVE-2020-3452-Cisco-Scanner", "full_name": "PR3R00T\/CVE-2020-3452-Cisco-Scanner", "owner": { "login": "PR3R00T", "id": 50199640, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/50199640?v=4", "html_url": "https:\/\/github.com\/PR3R00T" }, "html_url": "https:\/\/github.com\/PR3R00T\/CVE-2020-3452-Cisco-Scanner", "description": "CVE-2020-3452 Cisco ASA Scanner -unauth Path Traversal Check", "fork": false, "created_at": "2020-07-24T15:04:45Z", "updated_at": "2020-08-02T19:37:14Z", "pushed_at": "2020-08-02T19:37:12Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "forks": 0, "watchers": 1, "score": 0 }, { "id": 282267605, "name": "CVE-2020-3452", "full_name": "mr-r3b00t\/CVE-2020-3452", "owner": { "login": "mr-r3b00t", "id": 14963690, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/14963690?v=4", "html_url": "https:\/\/github.com\/mr-r3b00t" }, "html_url": "https:\/\/github.com\/mr-r3b00t\/CVE-2020-3452", "description": null, "fork": false, "created_at": "2020-07-24T16:26:52Z", "updated_at": "2020-07-24T17:11:07Z", "pushed_at": "2020-07-24T17:11:05Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "forks": 1, "watchers": 0, "score": 0 }, { "id": 282479219, "name": "CVE-2020-3452", "full_name": "foulenzer\/CVE-2020-3452", "owner": { "login": "foulenzer", "id": 41641874, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/41641874?v=4", "html_url": "https:\/\/github.com\/foulenzer" }, "html_url": "https:\/\/github.com\/foulenzer\/CVE-2020-3452", "description": "Little, stupid python validator(?) for CVE-2020-3452 on CISCO devices.", "fork": false, "created_at": "2020-07-25T16:11:55Z", "updated_at": "2020-08-02T16:26:14Z", "pushed_at": "2020-08-02T16:11:11Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "forks": 1, "watchers": 1, "score": 0 }, { "id": 283542069, "name": "http-vuln-cve2020-3452.nse", "full_name": "Gh0st0ne\/http-vuln-cve2020-3452.nse", "owner": { "login": "Gh0st0ne", "id": 47971115, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/47971115?v=4", "html_url": "https:\/\/github.com\/Gh0st0ne" }, "html_url": "https:\/\/github.com\/Gh0st0ne\/http-vuln-cve2020-3452.nse", "description": "CVE-2020-3452 : Cisco ASA and FTD Unauthorized Remote File Reading Nmap NSE Script", "fork": false, "created_at": "2020-07-29T15:57:26Z", "updated_at": "2020-07-30T23:54:22Z", "pushed_at": "2020-07-29T15:59:51Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 284219767, "name": "CVE-2020-3452", "full_name": "tacticalDevC\/CVE-2020-3452", "owner": { "login": "tacticalDevC", "id": 17967646, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/17967646?v=4", "html_url": "https:\/\/github.com\/tacticalDevC" }, "html_url": "https:\/\/github.com\/tacticalDevC\/CVE-2020-3452", "description": "CVE-2020-3452 exploit", "fork": false, "created_at": "2020-08-01T08:27:11Z", "updated_at": "2020-08-03T12:21:51Z", "pushed_at": "2020-08-01T08:59:28Z", "stargazers_count": 15, "watchers_count": 15, "forks_count": 0, "forks": 0, "watchers": 15, "score": 0 }, { "id": 284677041, "name": "CVE-2020-3452", "full_name": "paran0id34\/CVE-2020-3452", "owner": { "login": "paran0id34", "id": 68892986, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/68892986?v=4", "html_url": "https:\/\/github.com\/paran0id34" }, "html_url": "https:\/\/github.com\/paran0id34\/CVE-2020-3452", "description": "CVE-2020-3452 - directory traversal in Cisco ASA and Cisco Firepower Threat Defense", "fork": false, "created_at": "2020-08-03T11:02:23Z", "updated_at": "2020-08-03T11:03:24Z", "pushed_at": "2020-08-03T11:03:22Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 } ]