diff --git a/ghdb.xml b/ghdb.xml
index 9016b3176..cb22db22d 100644
--- a/ghdb.xml
+++ b/ghdb.xml
@@ -39718,6 +39718,22 @@ undeadsec.com
2021-09-16
J. Igor Melo
+
+ 8449
+ https://www.exploit-db.com/ghdb/8449
+ Files Containing Juicy Info
+ intext:"proftpd.conf" "index of"
+ Google Dork: intext:"proftpd.conf" "index of"
+Google finds ProFTPD configuration file.
+Date: 06/17/2024
+Author: Fernando Mengali
+
+ intext:"proftpd.conf" "index of"
+ https://www.google.com/search?q=intext:"proftpd.conf" "index of"
+
+ 2024-07-04
+ Fernando Mengali
+
8353
https://www.exploit-db.com/ghdb/8353
@@ -57563,6 +57579,19 @@ Reza Abasi(Turku)
2023-10-16
Mayuresh Gadhekar
+
+ 8442
+ https://www.exploit-db.com/ghdb/8442
+ Files Containing Juicy Info
+ site:.edu filetype:xls "root" database
+ xls files of root access of edu sites.
+
+ site:.edu filetype:xls "root" database
+ https://www.google.com/search?q=site:.edu filetype:xls "root" database
+
+ 2024-07-04
+ defaltredmode
+
7730
https://www.exploit-db.com/ghdb/7730
@@ -62045,6 +62074,22 @@ Reza Abasi(Turku)
2019-07-24
ahmed mohammed adel
+
+ 8446
+ https://www.exploit-db.com/ghdb/8446
+ Files Containing Passwords
+ intext:"aws_access_key_id" | intext:"aws_secret_access_key" filetype:json | filetype:yaml
+ Dork For : Finding exposed cloud service credentials
+
+Regards,
+Joel Indra
+
+ intext:"aws_access_key_id" | intext:"aws_secret_access_key" filetype:json | filetype:yaml
+ https://www.google.com/search?q=intext:"aws_access_key_id" | intext:"aws_secret_access_key" filetype:json | filetype:yaml
+
+ 2024-07-04
+ Joel Indra
+
6433
https://www.exploit-db.com/ghdb/6433
@@ -63320,6 +63365,22 @@ https://ch.linkedin.com/in/schmidbruno
2004-11-23
anonymous
+
+ 8443
+ https://www.exploit-db.com/ghdb/8443
+ Files Containing Passwords
+ intitle:index of /etc/ssh
+ # Google Dork: intitle:index of /etc/ssh
+# Files Containing Juicy Info
+# Date: 25/04/2024
+# Exploit: Shivam Dhingra
+
+ intitle:index of /etc/ssh
+ https://www.google.com/search?q=intitle:index of /etc/ssh
+
+ 2024-07-04
+ Shivam Dhingra
+
5732
https://www.exploit-db.com/ghdb/5732
@@ -117048,6 +117109,35 @@ https://www.exploit-db.com/exploits/48163
2020-06-17
Alexandros Pappas
+
+ 8445
+ https://www.exploit-db.com/ghdb/8445
+ Vulnerable Servers
+ intext:"siemens" & inurl:"/portal/portal.mwsl"
+ Description:
+Google Dork : intext:"siemens" & inurl:"/portal/portal.mwsl"
+
+This Google dork, intext:"siemens" & inurl:"/portal/portal.mwsl", reveals
+the web interfaces of Siemens S7 series PLC controllers. These interfaces
+provide access to critical control and monitoring functions of industrial
+systems. Unauthorized access can lead to significant operational
+disruptions and security risks in industrial environments.
+
+Proof Of Concept (PoC):
+Steps to Reproduce:
+1.Open Google Search.
+2.Enter the dork query: intext:"siemens" & inurl:"/portal/portal.mwsl".
+3.Review the search results to find URLs of Siemens S7 PLC web interfaces.
+4. Click on a search result to access the web interface of the PLC.
+5.Attempt to log in using default or commonly known credentials (if login
+is required).
+
+ intext:"siemens" & inurl:"/portal/portal.mwsl"
+ https://www.google.com/search?q=intext:"siemens" & inurl:"/portal/portal.mwsl"
+
+ 2024-07-04
+ Kishoreram
+
6728
https://www.exploit-db.com/ghdb/6728
@@ -117076,6 +117166,27 @@ https://www.exploit-db.com/exploits/48163
2004-08-13
anonymous
+
+ 8444
+ https://www.exploit-db.com/ghdb/8444
+ Vulnerable Servers
+ intext:GlobalProtect Portal inurl:/global-protect intitle:GlobalProtect Portal
+ # Exploit Title: Dork For GlobalProtect Portal (Login Panels to test
+CVE-2024-3400)
+
+# Google Dork:
+intext:GlobalProtect Portal inurl:/global-protect intitle:GlobalProtect Portal
+
+# Date: 17/05/2024
+
+# Author: Gurudatt Choudhary
+
+ Google Dork Submisson For GlobalProtect Portal
+ https://www.google.com/search?q=Google Dork Submisson For GlobalProtect Portal
+
+ 2024-07-04
+ Gurudatt Choudhary
+
3826
https://www.exploit-db.com/ghdb/3826
@@ -117375,6 +117486,24 @@ Demewoz Agegnehu | Sabean Technology | https://sabtechx.com
2004-05-04
anonymous
+
+ 8447
+ https://www.exploit-db.com/ghdb/8447
+ Vulnerable Servers
+ intitle:"SSL Network Extender Login" -checkpoint.com
+ This dork is for CVE-2024-24919.
+
+# Google Dork: [intitle:"SSL Network Extender Login" -checkpoint.com]
+# Date: [30/05/2024]
+# Pages Containing Login Portal
+# Exploit: Everton Hydd3n
+
+ intitle:"SSL Network Extender Login" -checkpoint.com
+ https://www.google.com/search?q=intitle:"SSL Network Extender Login" -checkpoint.com
+
+ 2024-07-04
+ Everton Hydd3n
+
117
https://www.exploit-db.com/ghdb/117
@@ -117676,6 +117805,24 @@ Felipe Molina
2014-02-05
anonymous
+
+ 8448
+ https://www.exploit-db.com/ghdb/8448
+ Vulnerable Servers
+ inurl:"cgi-bin/koha"
+ Find webservers running Koha library system
+
+--
+Regards,
+
+*Hilary Soita.*
+
+ inurl:"cgi-bin/koha"
+ https://www.google.com/search?q=inurl:"cgi-bin/koha"
+
+ 2024-07-04
+ Hilary Soita
+
387
https://www.exploit-db.com/ghdb/387