DB: 2024-07-05

1 changes to exploits/shellcodes/ghdb
This commit is contained in:
Exploit-DB 2024-07-05 00:16:26 +00:00
parent 859e322e5c
commit 388e822220

147
ghdb.xml
View file

@ -39718,6 +39718,22 @@ undeadsec.com</textualDescription>
<date>2021-09-16</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>8449</id>
<link>https://www.exploit-db.com/ghdb/8449</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;proftpd.conf&quot; &quot;index of&quot;</shortDescription>
<textualDescription>Google Dork: intext:&quot;proftpd.conf&quot; &quot;index of&quot;
Google finds ProFTPD configuration file.
Date: 06/17/2024
Author: Fernando Mengali
</textualDescription>
<query>intext:&quot;proftpd.conf&quot; &quot;index of&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;proftpd.conf&quot; &quot;index of&quot;</querystring>
<edb></edb>
<date>2024-07-04</date>
<author>Fernando Mengali</author>
</entry>
<entry>
<id>8353</id>
<link>https://www.exploit-db.com/ghdb/8353</link>
@ -57563,6 +57579,19 @@ Reza Abasi(Turku)
<date>2023-10-16</date>
<author>Mayuresh Gadhekar</author>
</entry>
<entry>
<id>8442</id>
<link>https://www.exploit-db.com/ghdb/8442</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:.edu filetype:xls &quot;root&quot; database</shortDescription>
<textualDescription>xls files of root access of edu sites.
</textualDescription>
<query>site:.edu filetype:xls &quot;root&quot; database</query>
<querystring>https://www.google.com/search?q=site:.edu filetype:xls &quot;root&quot; database</querystring>
<edb></edb>
<date>2024-07-04</date>
<author>defaltredmode</author>
</entry>
<entry>
<id>7730</id>
<link>https://www.exploit-db.com/ghdb/7730</link>
@ -62045,6 +62074,22 @@ Reza Abasi(Turku)
<date>2019-07-24</date>
<author>ahmed mohammed adel</author>
</entry>
<entry>
<id>8446</id>
<link>https://www.exploit-db.com/ghdb/8446</link>
<category>Files Containing Passwords</category>
<shortDescription>intext:&quot;aws_access_key_id&quot; | intext:&quot;aws_secret_access_key&quot; filetype:json | filetype:yaml</shortDescription>
<textualDescription>Dork For : Finding exposed cloud service credentials
Regards,
Joel Indra
</textualDescription>
<query>intext:&quot;aws_access_key_id&quot; | intext:&quot;aws_secret_access_key&quot; filetype:json | filetype:yaml</query>
<querystring>https://www.google.com/search?q=intext:&quot;aws_access_key_id&quot; | intext:&quot;aws_secret_access_key&quot; filetype:json | filetype:yaml</querystring>
<edb></edb>
<date>2024-07-04</date>
<author>Joel Indra</author>
</entry>
<entry>
<id>6433</id>
<link>https://www.exploit-db.com/ghdb/6433</link>
@ -63320,6 +63365,22 @@ https://ch.linkedin.com/in/schmidbruno
<date>2004-11-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>8443</id>
<link>https://www.exploit-db.com/ghdb/8443</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:index of /etc/ssh</shortDescription>
<textualDescription># Google Dork: intitle:index of /etc/ssh
# Files Containing Juicy Info
# Date: 25/04/2024
# Exploit: Shivam Dhingra
</textualDescription>
<query>intitle:index of /etc/ssh</query>
<querystring>https://www.google.com/search?q=intitle:index of /etc/ssh</querystring>
<edb></edb>
<date>2024-07-04</date>
<author>Shivam Dhingra</author>
</entry>
<entry>
<id>5732</id>
<link>https://www.exploit-db.com/ghdb/5732</link>
@ -117048,6 +117109,35 @@ https://www.exploit-db.com/exploits/48163
<date>2020-06-17</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>8445</id>
<link>https://www.exploit-db.com/ghdb/8445</link>
<category>Vulnerable Servers</category>
<shortDescription>intext:&quot;siemens&quot; &amp; inurl:&quot;/portal/portal.mwsl&quot;</shortDescription>
<textualDescription>Description:
Google Dork : intext:&quot;siemens&quot; &amp; inurl:&quot;/portal/portal.mwsl&quot;
This Google dork, intext:&quot;siemens&quot; &amp; inurl:&quot;/portal/portal.mwsl&quot;, reveals
the web interfaces of Siemens S7 series PLC controllers. These interfaces
provide access to critical control and monitoring functions of industrial
systems. Unauthorized access can lead to significant operational
disruptions and security risks in industrial environments.
Proof Of Concept (PoC):
Steps to Reproduce:
1.Open Google Search.
2.Enter the dork query: intext:&quot;siemens&quot; &amp; inurl:&quot;/portal/portal.mwsl&quot;.
3.Review the search results to find URLs of Siemens S7 PLC web interfaces.
4. Click on a search result to access the web interface of the PLC.
5.Attempt to log in using default or commonly known credentials (if login
is required).
</textualDescription>
<query>intext:&quot;siemens&quot; &amp; inurl:&quot;/portal/portal.mwsl&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;siemens&quot; &amp; inurl:&quot;/portal/portal.mwsl&quot;</querystring>
<edb></edb>
<date>2024-07-04</date>
<author>Kishoreram</author>
</entry>
<entry>
<id>6728</id>
<link>https://www.exploit-db.com/ghdb/6728</link>
@ -117076,6 +117166,27 @@ https://www.exploit-db.com/exploits/48163
<date>2004-08-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>8444</id>
<link>https://www.exploit-db.com/ghdb/8444</link>
<category>Vulnerable Servers</category>
<shortDescription>intext:GlobalProtect Portal inurl:/global-protect intitle:GlobalProtect Portal</shortDescription>
<textualDescription># Exploit Title: Dork For GlobalProtect Portal (Login Panels to test
CVE-2024-3400)
# Google Dork:
intext:GlobalProtect Portal inurl:/global-protect intitle:GlobalProtect Portal
# Date: 17/05/2024
# Author: Gurudatt Choudhary
</textualDescription>
<query>Google Dork Submisson For GlobalProtect Portal</query>
<querystring>https://www.google.com/search?q=Google Dork Submisson For GlobalProtect Portal</querystring>
<edb></edb>
<date>2024-07-04</date>
<author>Gurudatt Choudhary</author>
</entry>
<entry>
<id>3826</id>
<link>https://www.exploit-db.com/ghdb/3826</link>
@ -117375,6 +117486,24 @@ Demewoz Agegnehu | Sabean Technology | https://sabtechx.com</textualDescription>
<date>2004-05-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>8447</id>
<link>https://www.exploit-db.com/ghdb/8447</link>
<category>Vulnerable Servers</category>
<shortDescription>intitle:&quot;SSL Network Extender Login&quot; -checkpoint.com</shortDescription>
<textualDescription>This dork is for CVE-2024-24919.
# Google Dork: [intitle:&quot;SSL Network Extender Login&quot; -checkpoint.com]
# Date: [30/05/2024]
# Pages Containing Login Portal
# Exploit: Everton Hydd3n
</textualDescription>
<query>intitle:&quot;SSL Network Extender Login&quot; -checkpoint.com</query>
<querystring>https://www.google.com/search?q=intitle:&quot;SSL Network Extender Login&quot; -checkpoint.com</querystring>
<edb></edb>
<date>2024-07-04</date>
<author>Everton Hydd3n</author>
</entry>
<entry>
<id>117</id>
<link>https://www.exploit-db.com/ghdb/117</link>
@ -117676,6 +117805,24 @@ Felipe Molina</textualDescription>
<date>2014-02-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>8448</id>
<link>https://www.exploit-db.com/ghdb/8448</link>
<category>Vulnerable Servers</category>
<shortDescription>inurl:&quot;cgi-bin/koha&quot;</shortDescription>
<textualDescription>Find webservers running Koha library system
--
Regards,
*Hilary Soita.*
</textualDescription>
<query>inurl:&quot;cgi-bin/koha&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;cgi-bin/koha&quot;</querystring>
<edb></edb>
<date>2024-07-04</date>
<author>Hilary Soita</author>
</entry>
<entry>
<id>387</id>
<link>https://www.exploit-db.com/ghdb/387</link>