Skip to content

Commit f4fb00b

Browse files
author
certcc-ghbot
committed
Merge remote-tracking branch 'upstream/main'
2 parents 8b295d4 + 388e822 commit f4fb00b

File tree

1 file changed

+147
-0
lines changed

1 file changed

+147
-0
lines changed

ghdb.xml

Lines changed: 147 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39718,6 +39718,22 @@ undeadsec.com</textualDescription>
3971839718
<date>2021-09-16</date>
3971939719
<author>J. Igor Melo</author>
3972039720
</entry>
39721+
<entry>
39722+
<id>8449</id>
39723+
<link>https://www.exploit-db.com/ghdb/8449</link>
39724+
<category>Files Containing Juicy Info</category>
39725+
<shortDescription>intext:&quot;proftpd.conf&quot; &quot;index of&quot;</shortDescription>
39726+
<textualDescription>Google Dork: intext:&quot;proftpd.conf&quot; &quot;index of&quot;
39727+
Google finds ProFTPD configuration file.
39728+
Date: 06/17/2024
39729+
Author: Fernando Mengali
39730+
</textualDescription>
39731+
<query>intext:&quot;proftpd.conf&quot; &quot;index of&quot;</query>
39732+
<querystring>https://www.google.com/search?q=intext:&quot;proftpd.conf&quot; &quot;index of&quot;</querystring>
39733+
<edb></edb>
39734+
<date>2024-07-04</date>
39735+
<author>Fernando Mengali</author>
39736+
</entry>
3972139737
<entry>
3972239738
<id>8353</id>
3972339739
<link>https://www.exploit-db.com/ghdb/8353</link>
@@ -57563,6 +57579,19 @@ Reza Abasi(Turku)
5756357579
<date>2023-10-16</date>
5756457580
<author>Mayuresh Gadhekar</author>
5756557581
</entry>
57582+
<entry>
57583+
<id>8442</id>
57584+
<link>https://www.exploit-db.com/ghdb/8442</link>
57585+
<category>Files Containing Juicy Info</category>
57586+
<shortDescription>site:.edu filetype:xls &quot;root&quot; database</shortDescription>
57587+
<textualDescription>xls files of root access of edu sites.
57588+
</textualDescription>
57589+
<query>site:.edu filetype:xls &quot;root&quot; database</query>
57590+
<querystring>https://www.google.com/search?q=site:.edu filetype:xls &quot;root&quot; database</querystring>
57591+
<edb></edb>
57592+
<date>2024-07-04</date>
57593+
<author>defaltredmode</author>
57594+
</entry>
5756657595
<entry>
5756757596
<id>7730</id>
5756857597
<link>https://www.exploit-db.com/ghdb/7730</link>
@@ -62045,6 +62074,22 @@ Reza Abasi(Turku)
6204562074
<date>2019-07-24</date>
6204662075
<author>ahmed mohammed adel</author>
6204762076
</entry>
62077+
<entry>
62078+
<id>8446</id>
62079+
<link>https://www.exploit-db.com/ghdb/8446</link>
62080+
<category>Files Containing Passwords</category>
62081+
<shortDescription>intext:&quot;aws_access_key_id&quot; | intext:&quot;aws_secret_access_key&quot; filetype:json | filetype:yaml</shortDescription>
62082+
<textualDescription>Dork For : Finding exposed cloud service credentials
62083+
62084+
Regards,
62085+
Joel Indra
62086+
</textualDescription>
62087+
<query>intext:&quot;aws_access_key_id&quot; | intext:&quot;aws_secret_access_key&quot; filetype:json | filetype:yaml</query>
62088+
<querystring>https://www.google.com/search?q=intext:&quot;aws_access_key_id&quot; | intext:&quot;aws_secret_access_key&quot; filetype:json | filetype:yaml</querystring>
62089+
<edb></edb>
62090+
<date>2024-07-04</date>
62091+
<author>Joel Indra</author>
62092+
</entry>
6204862093
<entry>
6204962094
<id>6433</id>
6205062095
<link>https://www.exploit-db.com/ghdb/6433</link>
@@ -63320,6 +63365,22 @@ https://ch.linkedin.com/in/schmidbruno
6332063365
<date>2004-11-23</date>
6332163366
<author>anonymous</author>
6332263367
</entry>
63368+
<entry>
63369+
<id>8443</id>
63370+
<link>https://www.exploit-db.com/ghdb/8443</link>
63371+
<category>Files Containing Passwords</category>
63372+
<shortDescription>intitle:index of /etc/ssh</shortDescription>
63373+
<textualDescription># Google Dork: intitle:index of /etc/ssh
63374+
# Files Containing Juicy Info
63375+
# Date: 25/04/2024
63376+
# Exploit: Shivam Dhingra
63377+
</textualDescription>
63378+
<query>intitle:index of /etc/ssh</query>
63379+
<querystring>https://www.google.com/search?q=intitle:index of /etc/ssh</querystring>
63380+
<edb></edb>
63381+
<date>2024-07-04</date>
63382+
<author>Shivam Dhingra</author>
63383+
</entry>
6332363384
<entry>
6332463385
<id>5732</id>
6332563386
<link>https://www.exploit-db.com/ghdb/5732</link>
@@ -117048,6 +117109,35 @@ https://www.exploit-db.com/exploits/48163
117048117109
<date>2020-06-17</date>
117049117110
<author>Alexandros Pappas</author>
117050117111
</entry>
117112+
<entry>
117113+
<id>8445</id>
117114+
<link>https://www.exploit-db.com/ghdb/8445</link>
117115+
<category>Vulnerable Servers</category>
117116+
<shortDescription>intext:&quot;siemens&quot; &amp; inurl:&quot;/portal/portal.mwsl&quot;</shortDescription>
117117+
<textualDescription>Description:
117118+
Google Dork : intext:&quot;siemens&quot; &amp; inurl:&quot;/portal/portal.mwsl&quot;
117119+
117120+
This Google dork, intext:&quot;siemens&quot; &amp; inurl:&quot;/portal/portal.mwsl&quot;, reveals
117121+
the web interfaces of Siemens S7 series PLC controllers. These interfaces
117122+
provide access to critical control and monitoring functions of industrial
117123+
systems. Unauthorized access can lead to significant operational
117124+
disruptions and security risks in industrial environments.
117125+
117126+
Proof Of Concept (PoC):
117127+
Steps to Reproduce:
117128+
1.Open Google Search.
117129+
2.Enter the dork query: intext:&quot;siemens&quot; &amp; inurl:&quot;/portal/portal.mwsl&quot;.
117130+
3.Review the search results to find URLs of Siemens S7 PLC web interfaces.
117131+
4. Click on a search result to access the web interface of the PLC.
117132+
5.Attempt to log in using default or commonly known credentials (if login
117133+
is required).
117134+
</textualDescription>
117135+
<query>intext:&quot;siemens&quot; &amp; inurl:&quot;/portal/portal.mwsl&quot;</query>
117136+
<querystring>https://www.google.com/search?q=intext:&quot;siemens&quot; &amp; inurl:&quot;/portal/portal.mwsl&quot;</querystring>
117137+
<edb></edb>
117138+
<date>2024-07-04</date>
117139+
<author>Kishoreram</author>
117140+
</entry>
117051117141
<entry>
117052117142
<id>6728</id>
117053117143
<link>https://www.exploit-db.com/ghdb/6728</link>
@@ -117076,6 +117166,27 @@ https://www.exploit-db.com/exploits/48163
117076117166
<date>2004-08-13</date>
117077117167
<author>anonymous</author>
117078117168
</entry>
117169+
<entry>
117170+
<id>8444</id>
117171+
<link>https://www.exploit-db.com/ghdb/8444</link>
117172+
<category>Vulnerable Servers</category>
117173+
<shortDescription>intext:GlobalProtect Portal inurl:/global-protect intitle:GlobalProtect Portal</shortDescription>
117174+
<textualDescription># Exploit Title: Dork For GlobalProtect Portal (Login Panels to test
117175+
CVE-2024-3400)
117176+
117177+
# Google Dork:
117178+
intext:GlobalProtect Portal inurl:/global-protect intitle:GlobalProtect Portal
117179+
117180+
# Date: 17/05/2024
117181+
117182+
# Author: Gurudatt Choudhary
117183+
</textualDescription>
117184+
<query>Google Dork Submisson For GlobalProtect Portal</query>
117185+
<querystring>https://www.google.com/search?q=Google Dork Submisson For GlobalProtect Portal</querystring>
117186+
<edb></edb>
117187+
<date>2024-07-04</date>
117188+
<author>Gurudatt Choudhary</author>
117189+
</entry>
117079117190
<entry>
117080117191
<id>3826</id>
117081117192
<link>https://www.exploit-db.com/ghdb/3826</link>
@@ -117375,6 +117486,24 @@ Demewoz Agegnehu | Sabean Technology | https://sabtechx.com</textualDescription>
117375117486
<date>2004-05-04</date>
117376117487
<author>anonymous</author>
117377117488
</entry>
117489+
<entry>
117490+
<id>8447</id>
117491+
<link>https://www.exploit-db.com/ghdb/8447</link>
117492+
<category>Vulnerable Servers</category>
117493+
<shortDescription>intitle:&quot;SSL Network Extender Login&quot; -checkpoint.com</shortDescription>
117494+
<textualDescription>This dork is for CVE-2024-24919.
117495+
117496+
# Google Dork: [intitle:&quot;SSL Network Extender Login&quot; -checkpoint.com]
117497+
# Date: [30/05/2024]
117498+
# Pages Containing Login Portal
117499+
# Exploit: Everton Hydd3n
117500+
</textualDescription>
117501+
<query>intitle:&quot;SSL Network Extender Login&quot; -checkpoint.com</query>
117502+
<querystring>https://www.google.com/search?q=intitle:&quot;SSL Network Extender Login&quot; -checkpoint.com</querystring>
117503+
<edb></edb>
117504+
<date>2024-07-04</date>
117505+
<author>Everton Hydd3n</author>
117506+
</entry>
117378117507
<entry>
117379117508
<id>117</id>
117380117509
<link>https://www.exploit-db.com/ghdb/117</link>
@@ -117676,6 +117805,24 @@ Felipe Molina</textualDescription>
117676117805
<date>2014-02-05</date>
117677117806
<author>anonymous</author>
117678117807
</entry>
117808+
<entry>
117809+
<id>8448</id>
117810+
<link>https://www.exploit-db.com/ghdb/8448</link>
117811+
<category>Vulnerable Servers</category>
117812+
<shortDescription>inurl:&quot;cgi-bin/koha&quot;</shortDescription>
117813+
<textualDescription>Find webservers running Koha library system
117814+
117815+
--
117816+
Regards,
117817+
117818+
*Hilary Soita.*
117819+
</textualDescription>
117820+
<query>inurl:&quot;cgi-bin/koha&quot;</query>
117821+
<querystring>https://www.google.com/search?q=inurl:&quot;cgi-bin/koha&quot;</querystring>
117822+
<edb></edb>
117823+
<date>2024-07-04</date>
117824+
<author>Hilary Soita</author>
117825+
</entry>
117679117826
<entry>
117680117827
<id>387</id>
117681117828
<link>https://www.exploit-db.com/ghdb/387</link>

0 commit comments

Comments
 (0)