From 388e822220c370438738bb983e78284b686226a2 Mon Sep 17 00:00:00 2001 From: Exploit-DB Date: Fri, 5 Jul 2024 00:16:26 +0000 Subject: [PATCH] DB: 2024-07-05 1 changes to exploits/shellcodes/ghdb --- ghdb.xml | 147 +++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 147 insertions(+) diff --git a/ghdb.xml b/ghdb.xml index 9016b3176..cb22db22d 100644 --- a/ghdb.xml +++ b/ghdb.xml @@ -39718,6 +39718,22 @@ undeadsec.com 2021-09-16 J. Igor Melo + + 8449 + https://www.exploit-db.com/ghdb/8449 + Files Containing Juicy Info + intext:"proftpd.conf" "index of" + Google Dork: intext:"proftpd.conf" "index of" +Google finds ProFTPD configuration file. +Date: 06/17/2024 +Author: Fernando Mengali + + intext:"proftpd.conf" "index of" + https://www.google.com/search?q=intext:"proftpd.conf" "index of" + + 2024-07-04 + Fernando Mengali + 8353 https://www.exploit-db.com/ghdb/8353 @@ -57563,6 +57579,19 @@ Reza Abasi(Turku) 2023-10-16 Mayuresh Gadhekar + + 8442 + https://www.exploit-db.com/ghdb/8442 + Files Containing Juicy Info + site:.edu filetype:xls "root" database + xls files of root access of edu sites. + + site:.edu filetype:xls "root" database + https://www.google.com/search?q=site:.edu filetype:xls "root" database + + 2024-07-04 + defaltredmode + 7730 https://www.exploit-db.com/ghdb/7730 @@ -62045,6 +62074,22 @@ Reza Abasi(Turku) 2019-07-24 ahmed mohammed adel + + 8446 + https://www.exploit-db.com/ghdb/8446 + Files Containing Passwords + intext:"aws_access_key_id" | intext:"aws_secret_access_key" filetype:json | filetype:yaml + Dork For : Finding exposed cloud service credentials + +Regards, +Joel Indra + + intext:"aws_access_key_id" | intext:"aws_secret_access_key" filetype:json | filetype:yaml + https://www.google.com/search?q=intext:"aws_access_key_id" | intext:"aws_secret_access_key" filetype:json | filetype:yaml + + 2024-07-04 + Joel Indra + 6433 https://www.exploit-db.com/ghdb/6433 @@ -63320,6 +63365,22 @@ https://ch.linkedin.com/in/schmidbruno 2004-11-23 anonymous + + 8443 + https://www.exploit-db.com/ghdb/8443 + Files Containing Passwords + intitle:index of /etc/ssh + # Google Dork: intitle:index of /etc/ssh +# Files Containing Juicy Info +# Date: 25/04/2024 +# Exploit: Shivam Dhingra + + intitle:index of /etc/ssh + https://www.google.com/search?q=intitle:index of /etc/ssh + + 2024-07-04 + Shivam Dhingra + 5732 https://www.exploit-db.com/ghdb/5732 @@ -117048,6 +117109,35 @@ https://www.exploit-db.com/exploits/48163 2020-06-17 Alexandros Pappas + + 8445 + https://www.exploit-db.com/ghdb/8445 + Vulnerable Servers + intext:"siemens" & inurl:"/portal/portal.mwsl" + Description: +Google Dork : intext:"siemens" & inurl:"/portal/portal.mwsl" + +This Google dork, intext:"siemens" & inurl:"/portal/portal.mwsl", reveals +the web interfaces of Siemens S7 series PLC controllers. These interfaces +provide access to critical control and monitoring functions of industrial +systems. Unauthorized access can lead to significant operational +disruptions and security risks in industrial environments. + +Proof Of Concept (PoC): +Steps to Reproduce: +1.Open Google Search. +2.Enter the dork query: intext:"siemens" & inurl:"/portal/portal.mwsl". +3.Review the search results to find URLs of Siemens S7 PLC web interfaces. +4. Click on a search result to access the web interface of the PLC. +5.Attempt to log in using default or commonly known credentials (if login +is required). + + intext:"siemens" & inurl:"/portal/portal.mwsl" + https://www.google.com/search?q=intext:"siemens" & inurl:"/portal/portal.mwsl" + + 2024-07-04 + Kishoreram + 6728 https://www.exploit-db.com/ghdb/6728 @@ -117076,6 +117166,27 @@ https://www.exploit-db.com/exploits/48163 2004-08-13 anonymous + + 8444 + https://www.exploit-db.com/ghdb/8444 + Vulnerable Servers + intext:GlobalProtect Portal inurl:/global-protect intitle:GlobalProtect Portal + # Exploit Title: Dork For GlobalProtect Portal (Login Panels to test +CVE-2024-3400) + +# Google Dork: +intext:GlobalProtect Portal inurl:/global-protect intitle:GlobalProtect Portal + +# Date: 17/05/2024 + +# Author: Gurudatt Choudhary + + Google Dork Submisson For GlobalProtect Portal + https://www.google.com/search?q=Google Dork Submisson For GlobalProtect Portal + + 2024-07-04 + Gurudatt Choudhary + 3826 https://www.exploit-db.com/ghdb/3826 @@ -117375,6 +117486,24 @@ Demewoz Agegnehu | Sabean Technology | https://sabtechx.com 2004-05-04 anonymous + + 8447 + https://www.exploit-db.com/ghdb/8447 + Vulnerable Servers + intitle:"SSL Network Extender Login" -checkpoint.com + This dork is for CVE-2024-24919. + +# Google Dork: [intitle:"SSL Network Extender Login" -checkpoint.com] +# Date: [30/05/2024] +# Pages Containing Login Portal +# Exploit: Everton Hydd3n + + intitle:"SSL Network Extender Login" -checkpoint.com + https://www.google.com/search?q=intitle:"SSL Network Extender Login" -checkpoint.com + + 2024-07-04 + Everton Hydd3n + 117 https://www.exploit-db.com/ghdb/117 @@ -117676,6 +117805,24 @@ Felipe Molina 2014-02-05 anonymous + + 8448 + https://www.exploit-db.com/ghdb/8448 + Vulnerable Servers + inurl:"cgi-bin/koha" + Find webservers running Koha library system + +-- +Regards, + +*Hilary Soita.* + + inurl:"cgi-bin/koha" + https://www.google.com/search?q=inurl:"cgi-bin/koha" + + 2024-07-04 + Hilary Soita + 387 https://www.exploit-db.com/ghdb/387