PoC-in-GitHub/2020/CVE-2020-3452.json
2025-01-04 03:32:25 +09:00

687 lines
No EOL
23 KiB
JSON

[
{
"id": 282086490,
"name": "CVE-2020-3452-PoC",
"full_name": "XDev05\/CVE-2020-3452-PoC",
"owner": {
"login": "XDev05",
"id": 55960303,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55960303?v=4",
"html_url": "https:\/\/github.com\/XDev05",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/XDev05\/CVE-2020-3452-PoC",
"description": null,
"fork": false,
"created_at": "2020-07-24T00:39:11Z",
"updated_at": "2020-09-17T04:12:51Z",
"pushed_at": "2020-07-24T00:49:40Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
{
"id": 282135631,
"name": "cve-2020-3452",
"full_name": "Loneyers\/cve-2020-3452",
"owner": {
"login": "Loneyers",
"id": 29177120,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29177120?v=4",
"html_url": "https:\/\/github.com\/Loneyers",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Loneyers\/cve-2020-3452",
"description": "unauth file read in cisco asa & firepower.",
"fork": false,
"created_at": "2020-07-24T05:56:32Z",
"updated_at": "2021-08-14T01:56:21Z",
"pushed_at": "2020-07-24T06:02:19Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
{
"id": 282249421,
"name": "CVE-2020-3452-Cisco-Scanner",
"full_name": "PR3R00T\/CVE-2020-3452-Cisco-Scanner",
"owner": {
"login": "PR3R00T",
"id": 50199640,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50199640?v=4",
"html_url": "https:\/\/github.com\/PR3R00T",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/PR3R00T\/CVE-2020-3452-Cisco-Scanner",
"description": "CVE-2020-3452 Cisco ASA Scanner -unauth Path Traversal Check",
"fork": false,
"created_at": "2020-07-24T15:04:45Z",
"updated_at": "2024-11-26T06:19:54Z",
"pushed_at": "2020-08-30T21:34:41Z",
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 25,
"score": 0,
"subscribers_count": 1
},
{
"id": 282267605,
"name": "CVE-2020-3452",
"full_name": "mr-r3b00t\/CVE-2020-3452",
"owner": {
"login": "mr-r3b00t",
"id": 14963690,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14963690?v=4",
"html_url": "https:\/\/github.com\/mr-r3b00t",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mr-r3b00t\/CVE-2020-3452",
"description": null,
"fork": false,
"created_at": "2020-07-24T16:26:52Z",
"updated_at": "2024-08-12T20:04:04Z",
"pushed_at": "2020-07-24T17:11:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 282479219,
"name": "CVE-2020-3452",
"full_name": "foulenzer\/CVE-2020-3452",
"owner": {
"login": "foulenzer",
"id": 41641874,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41641874?v=4",
"html_url": "https:\/\/github.com\/foulenzer",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/foulenzer\/CVE-2020-3452",
"description": "Little, stupid python validator(?) for CVE-2020-3452 on CISCO devices.",
"fork": false,
"created_at": "2020-07-25T16:11:55Z",
"updated_at": "2020-10-20T14:27:21Z",
"pushed_at": "2020-08-02T16:11:11Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"bugbounty",
"cisco",
"cve-2020-3452",
"itsec"
],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 283542069,
"name": "http-vuln-cve2020-3452.nse",
"full_name": "Gh0st0ne\/http-vuln-cve2020-3452.nse",
"owner": {
"login": "Gh0st0ne",
"id": 47971115,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47971115?v=4",
"html_url": "https:\/\/github.com\/Gh0st0ne",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Gh0st0ne\/http-vuln-cve2020-3452.nse",
"description": "CVE-2020-3452 : Cisco ASA and FTD Unauthorized Remote File Reading Nmap NSE Script",
"fork": false,
"created_at": "2020-07-29T15:57:26Z",
"updated_at": "2020-07-30T23:54:22Z",
"pushed_at": "2020-10-15T13:42:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 284219767,
"name": "CVE-2020-3452",
"full_name": "0x5ECF4ULT\/CVE-2020-3452",
"owner": {
"login": "0x5ECF4ULT",
"id": 17967646,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17967646?v=4",
"html_url": "https:\/\/github.com\/0x5ECF4ULT",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0x5ECF4ULT\/CVE-2020-3452",
"description": "CVE-2020-3452 exploit",
"fork": false,
"created_at": "2020-08-01T08:27:11Z",
"updated_at": "2024-07-15T15:03:20Z",
"pushed_at": "2020-08-01T08:59:28Z",
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 24,
"score": 0,
"subscribers_count": 1
},
{
"id": 284677041,
"name": "CVE-2020-3452",
"full_name": "paran0id34\/CVE-2020-3452",
"owner": {
"login": "paran0id34",
"id": 68892986,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68892986?v=4",
"html_url": "https:\/\/github.com\/paran0id34",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/paran0id34\/CVE-2020-3452",
"description": "CVE-2020-3452 - directory traversal in Cisco ASA and Cisco Firepower Threat Defense",
"fork": false,
"created_at": "2020-08-03T11:02:23Z",
"updated_at": "2022-07-06T09:55:04Z",
"pushed_at": "2021-06-02T02:44:56Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 287222475,
"name": "CVE-2020-3452",
"full_name": "murataydemir\/CVE-2020-3452",
"owner": {
"login": "murataydemir",
"id": 16391655,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16391655?v=4",
"html_url": "https:\/\/github.com\/murataydemir",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/murataydemir\/CVE-2020-3452",
"description": "[CVE-2020-3452] Cisco Adaptive Security Appliance (ASA) & Cisco Firepower Threat Defense (FTD) Web Service Read-Only Directory Traversal",
"fork": false,
"created_at": "2020-08-13T08:22:27Z",
"updated_at": "2024-08-12T20:04:39Z",
"pushed_at": "2020-09-16T20:50:02Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},
{
"id": 291733229,
"name": "Cisco-ASA-LFI",
"full_name": "ludy-dev\/Cisco-ASA-LFI",
"owner": {
"login": "ludy-dev",
"id": 70466565,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70466565?v=4",
"html_url": "https:\/\/github.com\/ludy-dev",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ludy-dev\/Cisco-ASA-LFI",
"description": "(CVE-2020-3452) Cisco Adaptive Security Appliance Software - Local File Inclusion Vuln Test sciript",
"fork": false,
"created_at": "2020-08-31T14:11:19Z",
"updated_at": "2020-11-07T10:00:24Z",
"pushed_at": "2020-11-07T10:00:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 299192944,
"name": "CVE-2020-3452-Exploit",
"full_name": "3ndG4me\/CVE-2020-3452-Exploit",
"owner": {
"login": "3ndG4me",
"id": 14339392,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14339392?v=4",
"html_url": "https:\/\/github.com\/3ndG4me",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/3ndG4me\/CVE-2020-3452-Exploit",
"description": "Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.",
"fork": false,
"created_at": "2020-09-28T05:00:37Z",
"updated_at": "2024-11-26T06:19:59Z",
"pushed_at": "2020-10-10T17:19:51Z",
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"bash",
"cisco",
"cve",
"cve-2020-3452",
"exploit",
"hacktoberfest",
"shell",
"vulnerability"
],
"visibility": "public",
"forks": 11,
"watchers": 25,
"score": 0,
"subscribers_count": 2
},
{
"id": 314063056,
"name": "CVE-2020-3452",
"full_name": "grim3\/CVE-2020-3452",
"owner": {
"login": "grim3",
"id": 24641185,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24641185?v=4",
"html_url": "https:\/\/github.com\/grim3",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/grim3\/CVE-2020-3452",
"description": "CVE-2020-3452",
"fork": false,
"created_at": "2020-11-18T21:31:50Z",
"updated_at": "2024-08-14T06:19:52Z",
"pushed_at": "2020-11-18T21:45:18Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 321075427,
"name": "CVE-2020-3452",
"full_name": "cygenta\/CVE-2020-3452",
"owner": {
"login": "cygenta",
"id": 49716463,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49716463?v=4",
"html_url": "https:\/\/github.com\/cygenta",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/cygenta\/CVE-2020-3452",
"description": null,
"fork": false,
"created_at": "2020-12-13T13:47:38Z",
"updated_at": "2024-01-28T18:09:57Z",
"pushed_at": "2022-06-02T20:15:06Z",
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 26,
"score": 0,
"subscribers_count": 3
},
{
"id": 327027118,
"name": "CISCO-CVE-2020-3452-Scanner-Exploiter",
"full_name": "darklotuskdb\/CISCO-CVE-2020-3452-Scanner-Exploiter",
"owner": {
"login": "darklotuskdb",
"id": 29382875,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29382875?v=4",
"html_url": "https:\/\/github.com\/darklotuskdb",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/darklotuskdb\/CISCO-CVE-2020-3452-Scanner-Exploiter",
"description": "CISCO CVE-2020-3452 Scanner & Exploiter",
"fork": false,
"created_at": "2021-01-05T14:41:13Z",
"updated_at": "2024-08-12T20:09:08Z",
"pushed_at": "2021-07-29T09:28:20Z",
"stargazers_count": 98,
"watchers_count": 98,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 98,
"score": 0,
"subscribers_count": 5
},
{
"id": 335520796,
"name": "Cisco-ASA-FTD-Web-Services-Traversal",
"full_name": "fuzzlove\/Cisco-ASA-FTD-Web-Services-Traversal",
"owner": {
"login": "fuzzlove",
"id": 44779781,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44779781?v=4",
"html_url": "https:\/\/github.com\/fuzzlove",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/fuzzlove\/Cisco-ASA-FTD-Web-Services-Traversal",
"description": "CVE-2020-3452 - Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) traversal",
"fork": false,
"created_at": "2021-02-03T05:45:53Z",
"updated_at": "2024-04-25T05:17:46Z",
"pushed_at": "2021-02-03T12:19:16Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"exploit",
"penetration-testing"
],
"visibility": "public",
"forks": 2,
"watchers": 5,
"score": 0,
"subscribers_count": 2
},
{
"id": 336020236,
"name": "Cisco-CVE-2020-3452-shodan-scanner",
"full_name": "faisalfs10x\/Cisco-CVE-2020-3452-shodan-scanner",
"owner": {
"login": "faisalfs10x",
"id": 51811615,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51811615?v=4",
"html_url": "https:\/\/github.com\/faisalfs10x",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/faisalfs10x\/Cisco-CVE-2020-3452-shodan-scanner",
"description": "simple bash script of CVE-2020-3452 Cisco ASA \/ Firepower Read-Only Path Traversal Vulnerability checker ",
"fork": false,
"created_at": "2021-02-04T16:50:27Z",
"updated_at": "2023-04-22T21:34:29Z",
"pushed_at": "2021-02-04T17:38:25Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2020-3452",
"exploit",
"poc",
"shodan-dorks"
],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 375576943,
"name": "CVE-2020-3452",
"full_name": "sujaygr8\/CVE-2020-3452",
"owner": {
"login": "sujaygr8",
"id": 39243813,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39243813?v=4",
"html_url": "https:\/\/github.com\/sujaygr8",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sujaygr8\/CVE-2020-3452",
"description": null,
"fork": false,
"created_at": "2021-06-10T05:09:52Z",
"updated_at": "2021-06-14T07:36:50Z",
"pushed_at": "2021-06-14T07:36:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 424128615,
"name": "CVE-2020-3452",
"full_name": "Aviksaikat\/CVE-2020-3452",
"owner": {
"login": "Aviksaikat",
"id": 31238298,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31238298?v=4",
"html_url": "https:\/\/github.com\/Aviksaikat",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Aviksaikat\/CVE-2020-3452",
"description": "Test vulnerability of CVE-2020-3452",
"fork": false,
"created_at": "2021-11-03T07:27:14Z",
"updated_at": "2023-02-06T13:44:50Z",
"pushed_at": "2021-11-03T09:04:26Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 446508911,
"name": "CVE-2020-3452_auto",
"full_name": "Veids\/CVE-2020-3452_auto",
"owner": {
"login": "Veids",
"id": 13793356,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13793356?v=4",
"html_url": "https:\/\/github.com\/Veids",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Veids\/CVE-2020-3452_auto",
"description": null,
"fork": false,
"created_at": "2022-01-10T16:56:40Z",
"updated_at": "2022-01-10T16:58:25Z",
"pushed_at": "2022-01-10T16:58:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 489632798,
"name": "cve-2020-3452",
"full_name": "iveresk\/cve-2020-3452",
"owner": {
"login": "iveresk",
"id": 28754633,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4",
"html_url": "https:\/\/github.com\/iveresk",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/iveresk\/cve-2020-3452",
"description": "Just proof of concept for Cisco CVE-2020-3452. Using external or internal file base.",
"fork": false,
"created_at": "2022-05-07T09:45:25Z",
"updated_at": "2022-05-07T09:47:56Z",
"pushed_at": "2022-05-07T09:47:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 805701801,
"name": "CVE-2020-3452",
"full_name": "Cappricio-Securities\/CVE-2020-3452",
"owner": {
"login": "Cappricio-Securities",
"id": 102907425,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4",
"html_url": "https:\/\/github.com\/Cappricio-Securities",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2020-3452",
"description": "Cisco Adaptive Security Appliance (ASA)\/Firepower Threat Defense (FTD) - Local File Inclusion",
"fork": false,
"created_at": "2024-05-25T08:11:31Z",
"updated_at": "2024-06-24T08:50:19Z",
"pushed_at": "2024-06-24T08:49:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"bugbounty",
"bugbounty-tool",
"bugbounty-tools",
"cisco",
"cisco-adaptive",
"cve",
"cve-2020-3452",
"cve-2020-3452-exploit",
"cve-2020-3452-poc",
"cve-2020-3452-scanner",
"lfi"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]