PoC-in-GitHub/2020/CVE-2020-3452.json
2020-08-04 00:08:36 +09:00

186 lines
No EOL
6.4 KiB
JSON

[
{
"id": 282086490,
"name": "CVE-2020-3452-PoC",
"full_name": "XDev05\/CVE-2020-3452-PoC",
"owner": {
"login": "XDev05",
"id": 55960303,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/55960303?v=4",
"html_url": "https:\/\/github.com\/XDev05"
},
"html_url": "https:\/\/github.com\/XDev05\/CVE-2020-3452-PoC",
"description": null,
"fork": false,
"created_at": "2020-07-24T00:39:11Z",
"updated_at": "2020-07-30T17:30:27Z",
"pushed_at": "2020-07-24T00:49:40Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 282135631,
"name": "cve-2020-3452",
"full_name": "Loneyers\/cve-2020-3452",
"owner": {
"login": "Loneyers",
"id": 29177120,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/29177120?v=4",
"html_url": "https:\/\/github.com\/Loneyers"
},
"html_url": "https:\/\/github.com\/Loneyers\/cve-2020-3452",
"description": "unauth file read in cisco asa & firepower.",
"fork": false,
"created_at": "2020-07-24T05:56:32Z",
"updated_at": "2020-07-24T06:02:21Z",
"pushed_at": "2020-07-24T06:02:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 282249421,
"name": "CVE-2020-3452-Cisco-Scanner",
"full_name": "PR3R00T\/CVE-2020-3452-Cisco-Scanner",
"owner": {
"login": "PR3R00T",
"id": 50199640,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/50199640?v=4",
"html_url": "https:\/\/github.com\/PR3R00T"
},
"html_url": "https:\/\/github.com\/PR3R00T\/CVE-2020-3452-Cisco-Scanner",
"description": "CVE-2020-3452 Cisco ASA Scanner -unauth Path Traversal Check",
"fork": false,
"created_at": "2020-07-24T15:04:45Z",
"updated_at": "2020-08-02T19:37:14Z",
"pushed_at": "2020-08-02T19:37:12Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 282267605,
"name": "CVE-2020-3452",
"full_name": "mr-r3b00t\/CVE-2020-3452",
"owner": {
"login": "mr-r3b00t",
"id": 14963690,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/14963690?v=4",
"html_url": "https:\/\/github.com\/mr-r3b00t"
},
"html_url": "https:\/\/github.com\/mr-r3b00t\/CVE-2020-3452",
"description": null,
"fork": false,
"created_at": "2020-07-24T16:26:52Z",
"updated_at": "2020-07-24T17:11:07Z",
"pushed_at": "2020-07-24T17:11:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 282479219,
"name": "CVE-2020-3452",
"full_name": "foulenzer\/CVE-2020-3452",
"owner": {
"login": "foulenzer",
"id": 41641874,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/41641874?v=4",
"html_url": "https:\/\/github.com\/foulenzer"
},
"html_url": "https:\/\/github.com\/foulenzer\/CVE-2020-3452",
"description": "Little, stupid python validator(?) for CVE-2020-3452 on CISCO devices.",
"fork": false,
"created_at": "2020-07-25T16:11:55Z",
"updated_at": "2020-08-02T16:26:14Z",
"pushed_at": "2020-08-02T16:11:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 283542069,
"name": "http-vuln-cve2020-3452.nse",
"full_name": "Gh0st0ne\/http-vuln-cve2020-3452.nse",
"owner": {
"login": "Gh0st0ne",
"id": 47971115,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/47971115?v=4",
"html_url": "https:\/\/github.com\/Gh0st0ne"
},
"html_url": "https:\/\/github.com\/Gh0st0ne\/http-vuln-cve2020-3452.nse",
"description": "CVE-2020-3452 : Cisco ASA and FTD Unauthorized Remote File Reading Nmap NSE Script",
"fork": false,
"created_at": "2020-07-29T15:57:26Z",
"updated_at": "2020-07-30T23:54:22Z",
"pushed_at": "2020-07-29T15:59:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 284219767,
"name": "CVE-2020-3452",
"full_name": "tacticalDevC\/CVE-2020-3452",
"owner": {
"login": "tacticalDevC",
"id": 17967646,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/17967646?v=4",
"html_url": "https:\/\/github.com\/tacticalDevC"
},
"html_url": "https:\/\/github.com\/tacticalDevC\/CVE-2020-3452",
"description": "CVE-2020-3452 exploit",
"fork": false,
"created_at": "2020-08-01T08:27:11Z",
"updated_at": "2020-08-03T12:21:51Z",
"pushed_at": "2020-08-01T08:59:28Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 0,
"forks": 0,
"watchers": 15,
"score": 0
},
{
"id": 284677041,
"name": "CVE-2020-3452",
"full_name": "paran0id34\/CVE-2020-3452",
"owner": {
"login": "paran0id34",
"id": 68892986,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/68892986?v=4",
"html_url": "https:\/\/github.com\/paran0id34"
},
"html_url": "https:\/\/github.com\/paran0id34\/CVE-2020-3452",
"description": "CVE-2020-3452 - directory traversal in Cisco ASA and Cisco Firepower Threat Defense",
"fork": false,
"created_at": "2020-08-03T11:02:23Z",
"updated_at": "2020-08-03T11:03:24Z",
"pushed_at": "2020-08-03T11:03:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]