DB: 2024-07-05
1 changes to exploits/shellcodes/ghdb
This commit is contained in:
parent
859e322e5c
commit
388e822220
1 changed files with 147 additions and 0 deletions
147
ghdb.xml
147
ghdb.xml
|
@ -39718,6 +39718,22 @@ undeadsec.com</textualDescription>
|
|||
<date>2021-09-16</date>
|
||||
<author>J. Igor Melo</author>
|
||||
</entry>
|
||||
<entry>
|
||||
<id>8449</id>
|
||||
<link>https://www.exploit-db.com/ghdb/8449</link>
|
||||
<category>Files Containing Juicy Info</category>
|
||||
<shortDescription>intext:"proftpd.conf" "index of"</shortDescription>
|
||||
<textualDescription>Google Dork: intext:"proftpd.conf" "index of"
|
||||
Google finds ProFTPD configuration file.
|
||||
Date: 06/17/2024
|
||||
Author: Fernando Mengali
|
||||
</textualDescription>
|
||||
<query>intext:"proftpd.conf" "index of"</query>
|
||||
<querystring>https://www.google.com/search?q=intext:"proftpd.conf" "index of"</querystring>
|
||||
<edb></edb>
|
||||
<date>2024-07-04</date>
|
||||
<author>Fernando Mengali</author>
|
||||
</entry>
|
||||
<entry>
|
||||
<id>8353</id>
|
||||
<link>https://www.exploit-db.com/ghdb/8353</link>
|
||||
|
@ -57563,6 +57579,19 @@ Reza Abasi(Turku)
|
|||
<date>2023-10-16</date>
|
||||
<author>Mayuresh Gadhekar</author>
|
||||
</entry>
|
||||
<entry>
|
||||
<id>8442</id>
|
||||
<link>https://www.exploit-db.com/ghdb/8442</link>
|
||||
<category>Files Containing Juicy Info</category>
|
||||
<shortDescription>site:.edu filetype:xls "root" database</shortDescription>
|
||||
<textualDescription>xls files of root access of edu sites.
|
||||
</textualDescription>
|
||||
<query>site:.edu filetype:xls "root" database</query>
|
||||
<querystring>https://www.google.com/search?q=site:.edu filetype:xls "root" database</querystring>
|
||||
<edb></edb>
|
||||
<date>2024-07-04</date>
|
||||
<author>defaltredmode</author>
|
||||
</entry>
|
||||
<entry>
|
||||
<id>7730</id>
|
||||
<link>https://www.exploit-db.com/ghdb/7730</link>
|
||||
|
@ -62045,6 +62074,22 @@ Reza Abasi(Turku)
|
|||
<date>2019-07-24</date>
|
||||
<author>ahmed mohammed adel</author>
|
||||
</entry>
|
||||
<entry>
|
||||
<id>8446</id>
|
||||
<link>https://www.exploit-db.com/ghdb/8446</link>
|
||||
<category>Files Containing Passwords</category>
|
||||
<shortDescription>intext:"aws_access_key_id" | intext:"aws_secret_access_key" filetype:json | filetype:yaml</shortDescription>
|
||||
<textualDescription>Dork For : Finding exposed cloud service credentials
|
||||
|
||||
Regards,
|
||||
Joel Indra
|
||||
</textualDescription>
|
||||
<query>intext:"aws_access_key_id" | intext:"aws_secret_access_key" filetype:json | filetype:yaml</query>
|
||||
<querystring>https://www.google.com/search?q=intext:"aws_access_key_id" | intext:"aws_secret_access_key" filetype:json | filetype:yaml</querystring>
|
||||
<edb></edb>
|
||||
<date>2024-07-04</date>
|
||||
<author>Joel Indra</author>
|
||||
</entry>
|
||||
<entry>
|
||||
<id>6433</id>
|
||||
<link>https://www.exploit-db.com/ghdb/6433</link>
|
||||
|
@ -63320,6 +63365,22 @@ https://ch.linkedin.com/in/schmidbruno
|
|||
<date>2004-11-23</date>
|
||||
<author>anonymous</author>
|
||||
</entry>
|
||||
<entry>
|
||||
<id>8443</id>
|
||||
<link>https://www.exploit-db.com/ghdb/8443</link>
|
||||
<category>Files Containing Passwords</category>
|
||||
<shortDescription>intitle:index of /etc/ssh</shortDescription>
|
||||
<textualDescription># Google Dork: intitle:index of /etc/ssh
|
||||
# Files Containing Juicy Info
|
||||
# Date: 25/04/2024
|
||||
# Exploit: Shivam Dhingra
|
||||
</textualDescription>
|
||||
<query>intitle:index of /etc/ssh</query>
|
||||
<querystring>https://www.google.com/search?q=intitle:index of /etc/ssh</querystring>
|
||||
<edb></edb>
|
||||
<date>2024-07-04</date>
|
||||
<author>Shivam Dhingra</author>
|
||||
</entry>
|
||||
<entry>
|
||||
<id>5732</id>
|
||||
<link>https://www.exploit-db.com/ghdb/5732</link>
|
||||
|
@ -117048,6 +117109,35 @@ https://www.exploit-db.com/exploits/48163
|
|||
<date>2020-06-17</date>
|
||||
<author>Alexandros Pappas</author>
|
||||
</entry>
|
||||
<entry>
|
||||
<id>8445</id>
|
||||
<link>https://www.exploit-db.com/ghdb/8445</link>
|
||||
<category>Vulnerable Servers</category>
|
||||
<shortDescription>intext:"siemens" & inurl:"/portal/portal.mwsl"</shortDescription>
|
||||
<textualDescription>Description:
|
||||
Google Dork : intext:"siemens" & inurl:"/portal/portal.mwsl"
|
||||
|
||||
This Google dork, intext:"siemens" & inurl:"/portal/portal.mwsl", reveals
|
||||
the web interfaces of Siemens S7 series PLC controllers. These interfaces
|
||||
provide access to critical control and monitoring functions of industrial
|
||||
systems. Unauthorized access can lead to significant operational
|
||||
disruptions and security risks in industrial environments.
|
||||
|
||||
Proof Of Concept (PoC):
|
||||
Steps to Reproduce:
|
||||
1.Open Google Search.
|
||||
2.Enter the dork query: intext:"siemens" & inurl:"/portal/portal.mwsl".
|
||||
3.Review the search results to find URLs of Siemens S7 PLC web interfaces.
|
||||
4. Click on a search result to access the web interface of the PLC.
|
||||
5.Attempt to log in using default or commonly known credentials (if login
|
||||
is required).
|
||||
</textualDescription>
|
||||
<query>intext:"siemens" & inurl:"/portal/portal.mwsl"</query>
|
||||
<querystring>https://www.google.com/search?q=intext:"siemens" & inurl:"/portal/portal.mwsl"</querystring>
|
||||
<edb></edb>
|
||||
<date>2024-07-04</date>
|
||||
<author>Kishoreram</author>
|
||||
</entry>
|
||||
<entry>
|
||||
<id>6728</id>
|
||||
<link>https://www.exploit-db.com/ghdb/6728</link>
|
||||
|
@ -117076,6 +117166,27 @@ https://www.exploit-db.com/exploits/48163
|
|||
<date>2004-08-13</date>
|
||||
<author>anonymous</author>
|
||||
</entry>
|
||||
<entry>
|
||||
<id>8444</id>
|
||||
<link>https://www.exploit-db.com/ghdb/8444</link>
|
||||
<category>Vulnerable Servers</category>
|
||||
<shortDescription>intext:GlobalProtect Portal inurl:/global-protect intitle:GlobalProtect Portal</shortDescription>
|
||||
<textualDescription># Exploit Title: Dork For GlobalProtect Portal (Login Panels to test
|
||||
CVE-2024-3400)
|
||||
|
||||
# Google Dork:
|
||||
intext:GlobalProtect Portal inurl:/global-protect intitle:GlobalProtect Portal
|
||||
|
||||
# Date: 17/05/2024
|
||||
|
||||
# Author: Gurudatt Choudhary
|
||||
</textualDescription>
|
||||
<query>Google Dork Submisson For GlobalProtect Portal</query>
|
||||
<querystring>https://www.google.com/search?q=Google Dork Submisson For GlobalProtect Portal</querystring>
|
||||
<edb></edb>
|
||||
<date>2024-07-04</date>
|
||||
<author>Gurudatt Choudhary</author>
|
||||
</entry>
|
||||
<entry>
|
||||
<id>3826</id>
|
||||
<link>https://www.exploit-db.com/ghdb/3826</link>
|
||||
|
@ -117375,6 +117486,24 @@ Demewoz Agegnehu | Sabean Technology | https://sabtechx.com</textualDescription>
|
|||
<date>2004-05-04</date>
|
||||
<author>anonymous</author>
|
||||
</entry>
|
||||
<entry>
|
||||
<id>8447</id>
|
||||
<link>https://www.exploit-db.com/ghdb/8447</link>
|
||||
<category>Vulnerable Servers</category>
|
||||
<shortDescription>intitle:"SSL Network Extender Login" -checkpoint.com</shortDescription>
|
||||
<textualDescription>This dork is for CVE-2024-24919.
|
||||
|
||||
# Google Dork: [intitle:"SSL Network Extender Login" -checkpoint.com]
|
||||
# Date: [30/05/2024]
|
||||
# Pages Containing Login Portal
|
||||
# Exploit: Everton Hydd3n
|
||||
</textualDescription>
|
||||
<query>intitle:"SSL Network Extender Login" -checkpoint.com</query>
|
||||
<querystring>https://www.google.com/search?q=intitle:"SSL Network Extender Login" -checkpoint.com</querystring>
|
||||
<edb></edb>
|
||||
<date>2024-07-04</date>
|
||||
<author>Everton Hydd3n</author>
|
||||
</entry>
|
||||
<entry>
|
||||
<id>117</id>
|
||||
<link>https://www.exploit-db.com/ghdb/117</link>
|
||||
|
@ -117676,6 +117805,24 @@ Felipe Molina</textualDescription>
|
|||
<date>2014-02-05</date>
|
||||
<author>anonymous</author>
|
||||
</entry>
|
||||
<entry>
|
||||
<id>8448</id>
|
||||
<link>https://www.exploit-db.com/ghdb/8448</link>
|
||||
<category>Vulnerable Servers</category>
|
||||
<shortDescription>inurl:"cgi-bin/koha"</shortDescription>
|
||||
<textualDescription>Find webservers running Koha library system
|
||||
|
||||
--
|
||||
Regards,
|
||||
|
||||
*Hilary Soita.*
|
||||
</textualDescription>
|
||||
<query>inurl:"cgi-bin/koha"</query>
|
||||
<querystring>https://www.google.com/search?q=inurl:"cgi-bin/koha"</querystring>
|
||||
<edb></edb>
|
||||
<date>2024-07-04</date>
|
||||
<author>Hilary Soita</author>
|
||||
</entry>
|
||||
<entry>
|
||||
<id>387</id>
|
||||
<link>https://www.exploit-db.com/ghdb/387</link>
|
||||
|
|
Loading…
Add table
Reference in a new issue