Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-3580 PoC — 多款Cisco产品跨站脚本漏洞

Source
Associated Vulnerability
Title:多款Cisco产品跨站脚本漏洞 (CVE-2020-3580)
Description:Cisco Firepower Threat Defense(FTD)和Cisco Adaptive Security Appliances Software(ASA Software)都是美国思科(Cisco)公司的产品。Cisco Firepower Threat Defense是一套提供下一代防火墙服务的统一软件。Cisco Adaptive Security Appliances Software是一套防火墙和网络安全平台。该平台提供了对数据和网络资源的高度安全的访问等功能。 Cisco Adap
Description
Automated bulk IP or domain scanner for CVE 2020 3580. Cisco ASA and FTD XSS hunter.
Readme
<h1 align="center">
  <br>
 CVE-2020-3580 Automated Scanner 
</h1>

<h4 align="center">CVE-2020-3580 - Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software XSS.</h4>


<p align="center">
<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-3580"><img src="https://nvd.nist.gov/site-media/images/favicons/favicon-32x32.png"></a>
</p>
      


---





### Usage

```sh
▶ git clone "https://github.com/adarshvs/CVE-2020-3580.git"
▶ cd CVE-2020-3580
```
place domains/IP that you need to scan as .txt file format in the same folder
```sh
▶ python main.py
```

* Scan results will be stored under **output** folder
* Domains that were either not accessible or ingored during the scan will be listed under **output** folder as **ignored.txt** 
>Do not add https:// before domains lists
File Snapshot

[4.0K] /data/pocs/9a0a2e4a7aa9bf9362e4d4715825a4f65ab6eed5 ├── [2.0K] main.py ├── [ 831] README.md └── [ 36] target.txt 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.