@@ -39718,6 +39718,22 @@ undeadsec.com</textualDescription>
39718
39718
<date>2021-09-16</date>
39719
39719
<author>J. Igor Melo</author>
39720
39720
</entry>
39721
+ <entry>
39722
+ <id>8449</id>
39723
+ <link>https://www.exploit-db.com/ghdb/8449</link>
39724
+ <category>Files Containing Juicy Info</category>
39725
+ <shortDescription>intext:"proftpd.conf" "index of"</shortDescription>
39726
+ <textualDescription>Google Dork: intext:"proftpd.conf" "index of"
39727
+ Google finds ProFTPD configuration file.
39728
+ Date: 06/17/2024
39729
+ Author: Fernando Mengali
39730
+ </textualDescription>
39731
+ <query>intext:"proftpd.conf" "index of"</query>
39732
+ <querystring>https://www.google.com/search?q=intext:"proftpd.conf" "index of"</querystring>
39733
+ <edb></edb>
39734
+ <date>2024-07-04</date>
39735
+ <author>Fernando Mengali</author>
39736
+ </entry>
39721
39737
<entry>
39722
39738
<id>8353</id>
39723
39739
<link>https://www.exploit-db.com/ghdb/8353</link>
@@ -57563,6 +57579,19 @@ Reza Abasi(Turku)
57563
57579
<date>2023-10-16</date>
57564
57580
<author>Mayuresh Gadhekar</author>
57565
57581
</entry>
57582
+ <entry>
57583
+ <id>8442</id>
57584
+ <link>https://www.exploit-db.com/ghdb/8442</link>
57585
+ <category>Files Containing Juicy Info</category>
57586
+ <shortDescription>site:.edu filetype:xls "root" database</shortDescription>
57587
+ <textualDescription>xls files of root access of edu sites.
57588
+ </textualDescription>
57589
+ <query>site:.edu filetype:xls "root" database</query>
57590
+ <querystring>https://www.google.com/search?q=site:.edu filetype:xls "root" database</querystring>
57591
+ <edb></edb>
57592
+ <date>2024-07-04</date>
57593
+ <author>defaltredmode</author>
57594
+ </entry>
57566
57595
<entry>
57567
57596
<id>7730</id>
57568
57597
<link>https://www.exploit-db.com/ghdb/7730</link>
@@ -62045,6 +62074,22 @@ Reza Abasi(Turku)
62045
62074
<date>2019-07-24</date>
62046
62075
<author>ahmed mohammed adel</author>
62047
62076
</entry>
62077
+ <entry>
62078
+ <id>8446</id>
62079
+ <link>https://www.exploit-db.com/ghdb/8446</link>
62080
+ <category>Files Containing Passwords</category>
62081
+ <shortDescription>intext:"aws_access_key_id" | intext:"aws_secret_access_key" filetype:json | filetype:yaml</shortDescription>
62082
+ <textualDescription>Dork For : Finding exposed cloud service credentials
62083
+
62084
+ Regards,
62085
+ Joel Indra
62086
+ </textualDescription>
62087
+ <query>intext:"aws_access_key_id" | intext:"aws_secret_access_key" filetype:json | filetype:yaml</query>
62088
+ <querystring>https://www.google.com/search?q=intext:"aws_access_key_id" | intext:"aws_secret_access_key" filetype:json | filetype:yaml</querystring>
62089
+ <edb></edb>
62090
+ <date>2024-07-04</date>
62091
+ <author>Joel Indra</author>
62092
+ </entry>
62048
62093
<entry>
62049
62094
<id>6433</id>
62050
62095
<link>https://www.exploit-db.com/ghdb/6433</link>
@@ -63320,6 +63365,22 @@ https://ch.linkedin.com/in/schmidbruno
63320
63365
<date>2004-11-23</date>
63321
63366
<author>anonymous</author>
63322
63367
</entry>
63368
+ <entry>
63369
+ <id>8443</id>
63370
+ <link>https://www.exploit-db.com/ghdb/8443</link>
63371
+ <category>Files Containing Passwords</category>
63372
+ <shortDescription>intitle:index of /etc/ssh</shortDescription>
63373
+ <textualDescription># Google Dork: intitle:index of /etc/ssh
63374
+ # Files Containing Juicy Info
63375
+ # Date: 25/04/2024
63376
+ # Exploit: Shivam Dhingra
63377
+ </textualDescription>
63378
+ <query>intitle:index of /etc/ssh</query>
63379
+ <querystring>https://www.google.com/search?q=intitle:index of /etc/ssh</querystring>
63380
+ <edb></edb>
63381
+ <date>2024-07-04</date>
63382
+ <author>Shivam Dhingra</author>
63383
+ </entry>
63323
63384
<entry>
63324
63385
<id>5732</id>
63325
63386
<link>https://www.exploit-db.com/ghdb/5732</link>
@@ -117048,6 +117109,35 @@ https://www.exploit-db.com/exploits/48163
117048
117109
<date>2020-06-17</date>
117049
117110
<author>Alexandros Pappas</author>
117050
117111
</entry>
117112
+ <entry>
117113
+ <id>8445</id>
117114
+ <link>https://www.exploit-db.com/ghdb/8445</link>
117115
+ <category>Vulnerable Servers</category>
117116
+ <shortDescription>intext:"siemens" & inurl:"/portal/portal.mwsl"</shortDescription>
117117
+ <textualDescription>Description:
117118
+ Google Dork : intext:"siemens" & inurl:"/portal/portal.mwsl"
117119
+
117120
+ This Google dork, intext:"siemens" & inurl:"/portal/portal.mwsl", reveals
117121
+ the web interfaces of Siemens S7 series PLC controllers. These interfaces
117122
+ provide access to critical control and monitoring functions of industrial
117123
+ systems. Unauthorized access can lead to significant operational
117124
+ disruptions and security risks in industrial environments.
117125
+
117126
+ Proof Of Concept (PoC):
117127
+ Steps to Reproduce:
117128
+ 1.Open Google Search.
117129
+ 2.Enter the dork query: intext:"siemens" & inurl:"/portal/portal.mwsl".
117130
+ 3.Review the search results to find URLs of Siemens S7 PLC web interfaces.
117131
+ 4. Click on a search result to access the web interface of the PLC.
117132
+ 5.Attempt to log in using default or commonly known credentials (if login
117133
+ is required).
117134
+ </textualDescription>
117135
+ <query>intext:"siemens" & inurl:"/portal/portal.mwsl"</query>
117136
+ <querystring>https://www.google.com/search?q=intext:"siemens" & inurl:"/portal/portal.mwsl"</querystring>
117137
+ <edb></edb>
117138
+ <date>2024-07-04</date>
117139
+ <author>Kishoreram</author>
117140
+ </entry>
117051
117141
<entry>
117052
117142
<id>6728</id>
117053
117143
<link>https://www.exploit-db.com/ghdb/6728</link>
@@ -117076,6 +117166,27 @@ https://www.exploit-db.com/exploits/48163
117076
117166
<date>2004-08-13</date>
117077
117167
<author>anonymous</author>
117078
117168
</entry>
117169
+ <entry>
117170
+ <id>8444</id>
117171
+ <link>https://www.exploit-db.com/ghdb/8444</link>
117172
+ <category>Vulnerable Servers</category>
117173
+ <shortDescription>intext:GlobalProtect Portal inurl:/global-protect intitle:GlobalProtect Portal</shortDescription>
117174
+ <textualDescription># Exploit Title: Dork For GlobalProtect Portal (Login Panels to test
117175
+ CVE-2024-3400)
117176
+
117177
+ # Google Dork:
117178
+ intext:GlobalProtect Portal inurl:/global-protect intitle:GlobalProtect Portal
117179
+
117180
+ # Date: 17/05/2024
117181
+
117182
+ # Author: Gurudatt Choudhary
117183
+ </textualDescription>
117184
+ <query>Google Dork Submisson For GlobalProtect Portal</query>
117185
+ <querystring>https://www.google.com/search?q=Google Dork Submisson For GlobalProtect Portal</querystring>
117186
+ <edb></edb>
117187
+ <date>2024-07-04</date>
117188
+ <author>Gurudatt Choudhary</author>
117189
+ </entry>
117079
117190
<entry>
117080
117191
<id>3826</id>
117081
117192
<link>https://www.exploit-db.com/ghdb/3826</link>
@@ -117375,6 +117486,24 @@ Demewoz Agegnehu | Sabean Technology | https://sabtechx.com</textualDescription>
117375
117486
<date>2004-05-04</date>
117376
117487
<author>anonymous</author>
117377
117488
</entry>
117489
+ <entry>
117490
+ <id>8447</id>
117491
+ <link>https://www.exploit-db.com/ghdb/8447</link>
117492
+ <category>Vulnerable Servers</category>
117493
+ <shortDescription>intitle:"SSL Network Extender Login" -checkpoint.com</shortDescription>
117494
+ <textualDescription>This dork is for CVE-2024-24919.
117495
+
117496
+ # Google Dork: [intitle:"SSL Network Extender Login" -checkpoint.com]
117497
+ # Date: [30/05/2024]
117498
+ # Pages Containing Login Portal
117499
+ # Exploit: Everton Hydd3n
117500
+ </textualDescription>
117501
+ <query>intitle:"SSL Network Extender Login" -checkpoint.com</query>
117502
+ <querystring>https://www.google.com/search?q=intitle:"SSL Network Extender Login" -checkpoint.com</querystring>
117503
+ <edb></edb>
117504
+ <date>2024-07-04</date>
117505
+ <author>Everton Hydd3n</author>
117506
+ </entry>
117378
117507
<entry>
117379
117508
<id>117</id>
117380
117509
<link>https://www.exploit-db.com/ghdb/117</link>
@@ -117676,6 +117805,24 @@ Felipe Molina</textualDescription>
117676
117805
<date>2014-02-05</date>
117677
117806
<author>anonymous</author>
117678
117807
</entry>
117808
+ <entry>
117809
+ <id>8448</id>
117810
+ <link>https://www.exploit-db.com/ghdb/8448</link>
117811
+ <category>Vulnerable Servers</category>
117812
+ <shortDescription>inurl:"cgi-bin/koha"</shortDescription>
117813
+ <textualDescription>Find webservers running Koha library system
117814
+
117815
+ --
117816
+ Regards,
117817
+
117818
+ *Hilary Soita.*
117819
+ </textualDescription>
117820
+ <query>inurl:"cgi-bin/koha"</query>
117821
+ <querystring>https://www.google.com/search?q=inurl:"cgi-bin/koha"</querystring>
117822
+ <edb></edb>
117823
+ <date>2024-07-04</date>
117824
+ <author>Hilary Soita</author>
117825
+ </entry>
117679
117826
<entry>
117680
117827
<id>387</id>
117681
117828
<link>https://www.exploit-db.com/ghdb/387</link>
0 commit comments