PoC-in-GitHub/2020/CVE-2020-3452.json
2020-12-27 00:08:39 +09:00

140 lines
No EOL
4.9 KiB
JSON

[
{
"id": 282249421,
"name": "CVE-2020-3452-Cisco-Scanner",
"full_name": "PR3R00T\/CVE-2020-3452-Cisco-Scanner",
"owner": {
"login": "PR3R00T",
"id": 50199640,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/50199640?v=4",
"html_url": "https:\/\/github.com\/PR3R00T"
},
"html_url": "https:\/\/github.com\/PR3R00T\/CVE-2020-3452-Cisco-Scanner",
"description": "CVE-2020-3452 Cisco ASA Scanner -unauth Path Traversal Check",
"fork": false,
"created_at": "2020-07-24T15:04:45Z",
"updated_at": "2020-12-02T02:37:10Z",
"pushed_at": "2020-08-30T21:34:41Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 5,
"forks": 5,
"watchers": 15,
"score": 0
},
{
"id": 287222475,
"name": "CVE-2020-3452",
"full_name": "murataydemir\/CVE-2020-3452",
"owner": {
"login": "murataydemir",
"id": 16391655,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/16391655?v=4",
"html_url": "https:\/\/github.com\/murataydemir"
},
"html_url": "https:\/\/github.com\/murataydemir\/CVE-2020-3452",
"description": "[CVE-2020-3452] Cisco Adaptive Security Appliance (ASA) & Cisco Firepower Threat Defense (FTD) Web Service Read-Only Directory Traversal",
"fork": false,
"created_at": "2020-08-13T08:22:27Z",
"updated_at": "2020-09-16T20:50:04Z",
"pushed_at": "2020-09-16T20:50:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 291733229,
"name": "Cisco-ASA-LFI",
"full_name": "ludy-dev\/Cisco-ASA-LFI",
"owner": {
"login": "ludy-dev",
"id": 70466565,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/70466565?v=4",
"html_url": "https:\/\/github.com\/ludy-dev"
},
"html_url": "https:\/\/github.com\/ludy-dev\/Cisco-ASA-LFI",
"description": "(CVE-2020-3452) Cisco Adaptive Security Appliance Software - Local File Inclusion Vuln Test sciript",
"fork": false,
"created_at": "2020-08-31T14:11:19Z",
"updated_at": "2020-11-07T10:00:24Z",
"pushed_at": "2020-11-07T10:00:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 299192944,
"name": "CVE-2020-3452-Exploit",
"full_name": "3ndG4me\/CVE-2020-3452-Exploit",
"owner": {
"login": "3ndG4me",
"id": 14339392,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/14339392?v=4",
"html_url": "https:\/\/github.com\/3ndG4me"
},
"html_url": "https:\/\/github.com\/3ndG4me\/CVE-2020-3452-Exploit",
"description": "Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.",
"fork": false,
"created_at": "2020-09-28T05:00:37Z",
"updated_at": "2020-10-24T06:00:25Z",
"pushed_at": "2020-10-10T17:19:51Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 314063056,
"name": "CVE-2020-3452",
"full_name": "grim3\/CVE-2020-3452",
"owner": {
"login": "grim3",
"id": 24641185,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/24641185?v=4",
"html_url": "https:\/\/github.com\/grim3"
},
"html_url": "https:\/\/github.com\/grim3\/CVE-2020-3452",
"description": "CVE-2020-3452",
"fork": false,
"created_at": "2020-11-18T21:31:50Z",
"updated_at": "2020-11-18T21:48:22Z",
"pushed_at": "2020-11-18T21:45:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 321075427,
"name": "CVE-2020-3452",
"full_name": "cygenta\/CVE-2020-3452",
"owner": {
"login": "cygenta",
"id": 49716463,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/49716463?v=4",
"html_url": "https:\/\/github.com\/cygenta"
},
"html_url": "https:\/\/github.com\/cygenta\/CVE-2020-3452",
"description": null,
"fork": false,
"created_at": "2020-12-13T13:47:38Z",
"updated_at": "2020-12-16T12:02:35Z",
"pushed_at": "2020-12-13T13:49:30Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 4,
"forks": 4,
"watchers": 9,
"score": 0
}
]